Follow
Amal Ahmad
Title
Cited by
Cited by
Year
On tackling social engineering web phishing attacks utilizing software defined networks (SDN) approach
M Masoud, Y Jaradat, AQ Ahmad
2016 2nd International Conference on Open Source Software Computing (OSSCOM …, 2016
182016
The power consumption cost of data encryption in smartphones
M Masoud, I Jannoud, A Ahmad, H Al-Shobaky
2015 International Conference on Open Source Software Computing (OSSCOM), 1-6, 2015
182015
Prison Perimeter Surveillance System Using WSN.
SS Ismail, E Alkhader, A Ahmad
J. Comput. Sci. 13 (11), 674-679, 2017
152017
Evaluating and adopting E-learning systems in Al-zaytoonah university of Jordan
M Abduljawad, A Ahmad, KM Jaber, AA Thunaibat, EA Maria, ...
Int. J. Advance Soft Compu. Appl 12 (3), 82-99, 2020
142020
E-learning mobile application evaluation: Al-Zaytoonah University as a case study
KM Jaber, M Abduljawad, A Ahmad, M Abdallah, M Salah, N Alhindawi
Int. J. Advance Soft Compu. Appl 13 (3), 88-99, 2021
132021
User selective encryption method for securing MANETs
A Ahmad, S Ismail
International Journal of Electrical and Computer Engineering (IJECE) 8 (5 …, 2018
132018
An intelligent road traffic management system based on a human community genetic algorithm
AA Hnaif, ALM Nagham, M Abduljawad, A Ahmad
2019 IEEE Jordan international joint conference on electrical engineering …, 2019
92019
E-learning issues and solutions for students with disabilities during COVID-19 pandemic: Al-Zaytoonah University of Jordan case study
AQ Ahmad, MA Jawad, KM Jaber
International Journal of Evaluation and Research in Education 11 (4), 2087-2094, 2022
72022
Resource allocation for downlink non-orthogonal multiple access in joint transmission coordinated multi-point networks
MK Awad, MW Baidas, A Ahmad
Computer Communications 173, 134-149, 2021
72021
Comparative Analysis of Different Encryption Techniques in Mobile Ad-Hoc Networks (MANETs)
A Sharma, G Kushwaha
IITM Journal of Management and IT 10 (1), 55-64, 2019
72019
Machine learning approach for categorizing internet autonomous systems’ links
M Masoud, Y Jaradat, A Ahmad
ICGHIT, Hanzhou, China Google Scholar, 2017
62017
An analysis of mobile learning (M-Learning) in education
M Abduljawad, A Ahmad
Multicultural Education 9 (2), 145-152, 2023
52023
Optimal downlink resource allocation for joint transmission CoMP-enabled NOMA networks: a benchmark implementation
MK Awad, MW Baidas, A Ahmad
2019 36th National Radio Science Conference (NRSC), 249-258, 2019
32019
Human identity verification via automated analysis of fingerprint system features
A Ahmad, S Ismail, MA Jawad
Int. J. Innov. Comput. Inf. Control. IJICIC 15, 2183-2196, 2019
22019
Evaluating Cache Power Dissipation Across Different Process Technologies
S Ismail, A Ahmad, M Awad, MA Jawad
2018 IEEE/ACS 15th International Conference on Computer Systems and …, 2018
12018
Average Memory Access Time ReductionVia Adding Victim Cache
AQ Ahmad, M Masoud, SS Ismail
International Journal of Applied Engineering Research 11 (19), 9767-9771, 2016
12016
8216cnc08. pdf
A Ahmad, A Swidan, R Saifan
The system can't perform the operation now. Try again later.
Articles 1–17