A Simple Approach for Education Using Virtual Human Dataset

Author(s): Woo Chaw Seng | Seyed Hadi Mirisaee
Volume: 2
Issue: 1
Year: 2011





Analysis and Design of a Guaranteed Real Time Performance Enhanced Industrial Ethernet

Author(s): Qutaiba Ali | Basil Mahmood
Volume: 2
Issue: 1
Year: 2011





Image Denoising And Enhancement Using Multiwavelet With Hard Threshold In Digital Mammographic Images

Author(s): Kother Mohideen | Arumuga Perumal | Nallaperumal Krishnan | Mohamed Sathik
Volume: 2
Issue: 1
Year: 2011





Studying the Effects of Most Common Encryption Algorithms

Author(s): Diaa Salama | Hatem Abdual Kader | Mohiy Hadhoud
Volume: 2
Issue: 1
Year: 2011





Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation

Author(s): Marghny Mohamed | Fadwa Al-Afari | Mohamed Bamatraf
Volume: 2
Issue: 1
Year: 2011





Internet Banking Adoption in an Emerging Economy: Indian Consumer’s Perspective

Author(s): Rahmath Safeena | Hema Date | Abdullah Kammani
Volume: 2
Issue: 1
Year: 2011





A Multimedia Offline Cell Phone System For English Language Learning

Author(s): Osama Salameh
Volume: 2
Issue: 1
Year: 2011





Design and Implementation of a Port Simulator Using Formal Graphical Approach (FGA)

Author(s): Maged Elazony | Ahmed Khalifa | Mohamed Alsaied
Volume: 2
Issue: 1
Year: 2011





A System of Umpires for Security of Wireless Mobile Ad Hoc Network

Author(s): Ayyaswamy Kathirvel | Rengaramanujam Srinivasan
Volume: 1
Issue: 4
Year: 2010





Simple Scalar as an eLearning Mashup web application (eScalar)

Author(s): Aiman Abu Samra | Adwan Abdelfattah
Volume: 1
Issue: 4
Year: 2010





Senior Faculty Members' Attitudes in Jordanian Universities towards Using Information and Communication Technology

Author(s): Mahmoud Abu Qudais | Mosleh Al-Adhaileh | Aieman Al-Omari
Volume: 1
Issue: 4
Year: 2010





Authentication Method Using Hand Images for Access Control systems

Author(s): Raed Sahawneh | Ahmed Ibrahim | Sami Qawasmeh | Arwa Zabian.
Volume: 1
Issue: 4
Year: 2010





Effect of Electronic Interactive Technologies Usage on Services Marketing Activities Empirical Study on Banking Sector in Jordan

Author(s): Zakaria A. Azzam | Nidal M. Alramahi
Volume: 1
Issue: 4
Year: 2010





Reviewing Speaker Recognition Influence in Strengthening VOIP Caller Authentication

Author(s): Qutaiba Ali | Nada Abdul Ghani
Volume: 1
Issue: 4
Year: 2010





Text Summarization Extraction System (TSES) Using Extracted Keywords

Author(s): Rafeeq Al-Hashemi
Volume: 1
Issue: 4
Year: 2010





On Line Isolated Characters Recognition Using Dynamic Bayesian Networks

Author(s): Redouane Tlemsani | Abdelkader Benyettou
Volume: 1
Issue: 4
Year: 2010





Web Services Selection Based on Context Ontology and Quality of Services

Author(s): Nabil Keskes | Ahmed Lehireche | Abdellatif Rahmoun
Volume: 1
Issue: 3
Year: 2010





Push Pull Services Offering SMS Based m-Banking System in Context of Bangladesh

Author(s): Fouzia Mousumi | Subrun Jamil
Volume: 1
Issue: 3
Year: 2010





Applying Electronic Supply Chain Management Using Multi-Agent System: A Managerial Perspective

Author(s): Haitham Al-zu’bi
Volume: 1
Issue: 3
Year: 2010





An Effective Method for Fingerprint Classification

Author(s): Monowar Hussain Bhuyan | Sarat Saharia | Dhruba Kr Bhattacharyya
Volume: 1
Issue: 3
Year: 2010





Performance Evaluation of RESTful Web Services for Mobile Devices

Author(s): Hatem Hamad | Motaz Saad | Ramzi Abed
Volume: 1
Issue: 3
Year: 2010





Applying Penetration Tests on a Highly Secured Cooperative Network

Author(s): Qutaiba Ali | Salah Alabady
Volume: 1
Issue: 3
Year: 2010





An Empirical Study of Sources Affecting E-Business Value Creation in Jordanian Banking Services Sector

Author(s): Ali. Alawneh | Ezz Hattab
Volume: 1
Issue: 2
Year: 2009





Enhanced Authentication Mechanism Using Multilevel Security Model

Author(s): Abdulameer Hussain
Volume: 1
Issue: 2
Year: 2009





Design and Implementation of a Network Security Model for Cooperative Network

Author(s): Salah Alabady
Volume: 1
Issue: 2
Year: 2009





On Analysis of Quantifying Learning Creativity Phenomenon Considering Brain Synaptic Plasticity

Author(s): Hassan Mustafa
Volume: 1
Issue: 2
Year: 2009





Applying Reliability Solutions to a Cooperative Network

Author(s): Qutaiba Ali, | Salah Alabady | Yehya Qasim
Volume: 1
Issue: 2
Year: 2009





Information Fusion Using Ontology-Based Communication between Agents

Author(s): Tarek Sobh
Volume: 1
Issue: 2
Year: 2009





Object Oriented Data Modeling for Data Warehousing (An Extension of UML approach to study Hajj pilgrim’s private tour as a Case Study)

Author(s): Kamal Alaskar | Akhtar Shaikh
Volume: 1
Issue: 2
Year: 2009





Performance Evaluation of WLAN Internet Sharing Using DCF & PCF Modes

Author(s): Qutaiba Ali
Volume: 1
Issue: 1
Year: 2009





Intelligent System for Worm Detection

Author(s): Ibrahim Farag | Mohammed A. Shouman | Tarek S. Sobh | Heba El-Fiqi
Volume: 1
Issue: 1
Year: 2009





Bandwidth-Delay Measurements of a Wireless Internet Service Providing (WISP) System

Author(s): Qutaiba Ali | Ahmed Al-wattar
Volume: 1
Issue: 1
Year: 2009





How a Font Can Respect Basic Rules of Arabic Calligraphy

Author(s): Abdelouahad Bayar | Khalid Sam
Volume: 1
Issue: 1
Year: 2009





Getting The Benefits Of ICTs In Tourism Destinations: Models, Strategies And Tools

Author(s): Claudio Petti | Giuseppina Passiante
Volume: 1
Issue: 1
Year: 2009





Toward E-Knowledge Based Complaint Management

Author(s): Samiha Mjahed | Abdelfatteh Triki
Volume: 1
Issue: 1
Year: 2009





Resource Optimization in Automatic web page classification using integrated feature selection and machine learning

Author(s): Indra Mahadevan | Selvakuberan Karuppasamy | Rajaram Ramasamy
Volume: 1
Issue: 1
Year: 2009





Electronic Commerce Adoption in the Arab Countries – An Empirical Study

Author(s): Robert J. Nathan
Volume: 1
Issue: 1
Year: 2009




