Near field communication (NFC) HA Al-Ofeishat, MAA Al Rababah International Journal of Computer Science and Network Security (IJCSNS) 12 …, 2012 | 106 | 2012 |
A parallel genetic algorithm for maximum flow problem OM Surakhi, M Qatawneh, HA al Ofeishat International Journal of Advanced Computer Science and Applications 8 (6), 2017 | 20 | 2017 |
A hybrid grey wolf optimiser algorithm for solving time series classification problems HA Nsour, M Alweshah, AI Hammouri, HA Ofeishat, S Mirjalili Journal of Intelligent Systems 29 (1), 846-857, 2019 | 18 | 2019 |
Proactive algorithm dynamic mobile structure of Routing protocols of ad hoc networks AL Hussein, E Trad, T Al Smadi IJCSNS 18 (10), 86-90, 2018 | 13 | 2018 |
A new parallel matrix multiplication algorithm on tree-hypercube network using iman1 supercomputer O AbuAlghanam, M Qatawneh, HA al Ofeishat, O Adwan, A Huneiti International Journal of Advanced Computer Science and Applications 8 (12), 2017 | 9 | 2017 |
Real-time programming platforms in the mainstream environments HAA Ofeishat International Journal of Computer Science and Network Security 9 (1), 197-204, 2009 | 6 | 2009 |
A Parallel Chemical Reaction Optimization Algorithm for MaxFlow Problem HAO Mohammed Y. Alkhanafseh1, Mohammad Qatawneh1 International Journal of Computer Science and Information Security (IJCSIS …, 2017 | 2 | 2017 |
Scheduling in Heterogeneous Grid-Systems HA Al-Ofeishat Australian Journal of Basic and Applied Sciences 6 (10), 1-10, 2012 | 2 | 2012 |
AUTO-OPTIMIZATION IN SELF-ORGANIZING NETWORK (SON) FOR 4G LTE CELLULAR SYSTEMS. HA AL OFEISHAT Journal of Theoretical & Applied Information Technology 95 (20), 2017 | 1 | 2017 |
Dynamic Threshold Generalized Entropies-Based DDOS Detection Against Software-Defined Network Controller HAA ofeishat | | 2024 |
ENHANCING ANDROID SECURITY: NETWORK-DRIVEN MACHINE LEARNING APPROACH FOR MALWARE DETECTION HA AL-OFEISHAT Journal of Theoretical and Applied Information Technology 102 (2), 2024 | | 2024 |
A comparison study of three photovoltaic technologies in Jordan climate A Samarah, H Al-Ofeishat, A Bagwari, A Amyrah, A Hiary AIP Conference Proceedings 2930 (1), 2023 | | 2023 |
Build a Secure Network using Segmentation and Micro-segmentation Techniques H A Al-Ofeishat, R Alshorman International Journal of Computing and Digital Systems 14 (1), 1-16, 2023 | | 2023 |
Cryptoanalytic Method of Searching for the Secret Key and ITS Length on the Basis of Evolution Metaheuristics H Al-Ofeishat Journal of Engineering and Applied Sciences 15 (Issue: 1), 267-272, 2020 | | 2020 |
Potential Study for Hofa Farm Development GAS Ashraf Samarah, Hussein Al Ofeishat, Qatada Damra, Omayma Bani Salman Innovative Systems Design and Engineering 8 (8), 34-48, 2017 | | 2017 |
A New Parallel Matrix Multiplication Algorithm on Hex-Cell Network (PMMHC) Using IMAN1 Super Computer E Rawashdeh, M Qatawneh, HA Al Ofeishat International Journal of Computer Science & Information Technology (IJCSIT …, 2017 | | 2017 |
Back-propagation and Radial Basis Function Neural Networks "A Comparative Study” HA Al-Ofeishat Australian Journal of Basic and Applied Sciences 9 (31), 576-581, 2015 | | 2015 |
Effective Exploiting of Hardware Description Language as a Tool in Teaching the Digital and Computer Circuits F Al-Shreef, A Al-Tarazi, HA Al-Ofeishat, AS Khaled | | 2013 |
The impact of client-server modalities on cryptography H AHMAD Oriental journal for computer science and technology 5 (2), 199-204, 2012 | | 2012 |
Modified Hierarchical Method Planning Problems in Grid-Systems H AL-ofeshat Int. J. Contemp. Math. Sciences 7 (35), 1735-1748, 2012 | | 2012 |