|
EVALUATION OF COMMERCIAL OFF-THE-SHELF SOFTWARE: CRIME ANALYSIS SOFTWARE.
|
Written by Omar .I. Lasassmeh,Wafa Tarawneh, Asma Nawaisah |
Hits: 435
|
|
THE IMPACT OF TRANSACTION PROCESSING SYSTEMS IN MAKING OPERATIONAL DECISIONS: A CASE STUDY OF COMPUTERIZING THE EMPLOYEES AFFAIRS DEPARTMENT OF AL-BALQA APPLIED UNIVERSITY, AL-KARAK
|
Written by Wafa Atalleh Al-tarawneh |
Hits: 398
|
|
IMPROVING TSP SOLUTIONS USING GA WITH A NEW HYBRID MUTATION BASED ON KNOWLEDGE AND RANDOMNESS
|
Written by Esra'a Alkafaween, Ahmad B. A. Hassanat |
Hits: 1050
|
|
Novel Methods for Enhancing the Performance of Genetic Algorithms
|
Written by Esra'a Alkafaween |
Hits: 776
|
|
On Enhancing Genetic Algorithms Using New Crossovers
|
Written by Esra'a Alkafaween |
Hits: 887
|
|
DETECTING DISTRIBUTED DENIAL OF SERVICE ATTACKS USING DATA MINING TECHNIQUES
|
Written by Al-Kasassbeh, M; Al-Naymat, Gh; Hassanat, A; Almseidin, M |
Hits: 2531
|
|
BYPASSING CAPTCHA BY MACHINE—A PROOF FOR PASSING THE TURING TEST
|
Written by hasanat |
Hits: 2491
|
|
Video PowerSearcher: A Text-Based Indexing E-Learning System
|
Written by dr.Moaath Hajaya , dr.Farhan Obisat,dr. Azzam Sleit |
Hits: 2836
|
|
Image Error Recovery in Fax Transmission Using Data-prediction Methodology with JB
|
Written by Mohammad Abbadi |
Hits: 3087
|
|
A New Message Authentication Technique using Zingzag Manipulation and Block Chaini
|
Written by Mohammad A. Abbadi |
Hits: 3377
|