CIS ابحاث اعضاء هيئة التدريس 2013
الملخص | السنة | عنوان البحث | اسم المؤلفين |
Download | 2013 | "Effectively, and Efficiency Consideration for Spatial Database", International Journal of Computer Applications, 74(18):32-37. | Otair M. |
Download | 2013 | "Enhancement First Depth Search and Best First Search Using Ranges within R-Tree", Australian Journal of Basic and Applied Sciences, Vol. 7, No. 8, 571-579 | Otair M. |
Download | 2013 | "Uses Data Mining as a Business Intelligence Technique- Case Study: a Jordanian Company", Australian Journal of Basic and Applied Sciences, Vol. 7, No. 8, 595-603. | Otair, M. & Khader M. |
Download | 2013 | “Approximate K-Nearest Neighbor Based Spatial Clustering Using K-D Tree”. International Journal of Database Management Systems (IJDMS) Vol.5, No.1 | Otair M. |
Download | 2013 | "The Jordanian Mineral Resources Geographical Information System: A First Step towards a Computerized Exploration of the Jordanian Mineral". International Journal of Computer Science Issues IJCSI, Volume 10, Issue 2. | Otair M. |
Download | 2013 | “Comparative Analysis of Arabic Stemming Algorithms”. International Journal of Managing Information Technology (IJMIT), Vol. 5, No.2 | Otair M. |
Download | 2013 | " Optimizing an Arabic Query using Comprehensive Query Expansion Techniques", International Journal of Computer Applications, 71(17):42-49. | Otair,M., Kanaan G., Kanaan R. |
Download | 2013 | "Different Genetic Algorithm Strategies to Optimize the User Query in the Fuzzy Model", European Journal of Scientific Research, Vol. 112, No.4. | Al Mashagba, E., Al Mashagba, F., Nassar, M., & Otair M. |
Download | 2013 | Fingerprint Identification Technique Based On Wavelet-Bands Selection Features (WBSF), International Journal of Computer Engineering and Technology (IJCET). Vol. 4, No. 3. pp:308–323 | Al-Hassani, M., Abdulkareem Kadhim, A. & Samawi V. |
Download | 2013 | Arabic Expert System Shell, International Arab Journal of Information Technology (IAJIT), Vol. 10, No.1 | Samawi, V., Akram A. Mustafa, A., & Ahmad A. |
Download | 2013 | Software Protection via Hiding Function Using Software Obfuscation, International Arab Journal of Information Technology (IAJIT), Vol. 10, No. 6. | Samawi, V. & Adeeb S. |
Download | 2013 | Speaker Identification using Selected Features from DWT, Proceeding of the 2nd International Conference on Advanced Computer Science Applications and Technologies–ACSAT2013,23-24 December, Malaysia-Sarawak. | Abualadas, F., & Samawi V. |
Download | 2013 | Exploring Technological Factors Affecting The Adoption Of Mobile Commerce In Jordan, Australian Journal of Basic and Applied Sciences, ISSN: 1991-8178, Vol. 7, No.4,pp. 395-400 | Al Mashagba, F., Al Mashagba, E., & Nassar M. |
Download | 2013 | “New approach in cover image selection for embedding the secret image”, European Journal of Scientific Research, Volume 112 No 4, pp. 537-543. | Nassar, M., Al Mashagba, F., & Al Mashagba E. |
Download | 2013 | ”Automatic Isolated-Word Arabic Sign Language Recognition System Based On Time Delay Neural Networks: New Improvements”, Journal of Theoretical and Applied Information Technology, Vol. 57 Issue 1, p41-47. | Al Mashagba, E., Al Mashagba, F., & Nassar M. |