Folgen
Hatem S. A. Hamatta
Hatem S. A. Hamatta
Bestätigte E-Mail-Adresse bei bau.edu.jo
Titel
Zitiert von
Zitiert von
Jahr
A review of clustering algorithms as applied in MANETs
DM Bokhari, HSA Hamatta, ST Siddigui
International Journal of Advanced Research in Computer Science and Software …, 2012
402012
Secure watermarking scheme for color DICOM images in telemedicine applications
KU Singh, HS Abu-Hamatta, A Kumar, A Singhal, M Rashid, AK Bashir
Computers, Materials and Continua 70 (2), 2525-2542, 2021
292021
Security challenges as a factor affecting the security of manet: Attacks and security solutions
N Zanoon, N Albdour, HSA Hamatta, RM Al-Tarawneh
International Journal of Network Security & Its Applications (IJNSA) Vol 7, 1-13, 2015
182015
User security in e-learning system
HF Aldheleai, MU Bokhari, HSA Hamatta
2015 Fifth International Conference on Communication Systems and Network …, 2015
162015
Selecting Appropriate Requirements Management Tool for Developing Secure Enterprises Software
DM Alghazzawi, ST Siddiqui, MU Bokhari, HSA Hamatta
International Journal of Information Technology and Computer Science (IJITCS …, 2014
152014
Genetic Algorithm‐Based Human Mental Stress Detection and Alerting in Internet of Things
HSA Hamatta, K Banerjee, H Anandaram, M Shabbir Alam, ...
Computational Intelligence and Neuroscience 2022 (1), 4086213, 2022
142022
Ensemble-based multimodal medical imaging fusion for tumor segmentation
A Karthik, HSA Hamatta, S Patthi, C Krubakaran, AK Pradhan, ...
Biomedical Signal Processing and Control 96, 106550, 2024
112024
Article: Protocols in Mobile Ad-Hoc Networks: A Review
HSA Hamatta, MU Bokhari, ST Siddiqui
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249 …, 2014
8*2014
The Affect of Applying Accounting Information System on the Profitability of Commercial Banks in Jordan (A field study from Management’s Viewpoint)
ATS Gharaibeh, AIM Abu-dawleh, HSA Hamatta
Journal of Management Research 4 (2), 112, 2012
82012
TPL: novel efficient threshold power consumption scheme on MANET
HSA Hamatta, MU Bokhari, ST Siddigui
International Journal of Computer Applications 58 (15), 2012
72012
The affect of applying accounting information system on the profitability of commercial banks in Jordan
LMAR Wedyan, ATS Gharaibeh, AIM Abu-dawleh, HSA Hamatta
Management Research 4 (2), 112, 2012
62012
Novel Approach for Arabic Spell-Checker: Based on Radix Search Tree
R Al-tarawneh, HSA Hamatta, H Muiadi
International Journal of Computer Applications 95 (7), 1-5, 2014
52014
Multilevel Security Spiral (MSS) Model: NOVEL Approach
ST Siddiqui, HSA Hamatta, MU Bokhari
International Journal of Computer Applications 65 (20), 2013
52013
comparative review for routing protocols in mobile ad-hoc networks
RMAT Hatem S. A. Hamatta, Nabeel I. Zanoon
International Journal of Ad Hoc, Sensor & Ubiquitous Computing 7 (2), 13-31, 2016
4*2016
Implementation of Bluetooth Secure Simple Pairing (SSP) using Elliptic Curve Cryptography (ECC)
DHSAH r Dr.Ahmad Hweishel A.Alfarjat, Dr.Hanumanthappa .J.
International Journal of Computer Science & Network Security(IJCSNS) 21 (3 …, 2021
2*2021
A novel approach to improve LRU page replacement algorithm
N Zanoon, E Abu-Taieh, HSA Hamatta
Journal of Engineering and Applied Sciences 13 (2), 478-483, 2018
2*2018
Optimizing Industrial Engineering Performance with Fuzzy CNN Framework for Efficiency and Productivity.
S Bandhekar, AH Kalifullah, VKR Likki, HSA Hamatta, TN Yadav
International Journal of Advanced Computer Science & Applications 15 (6), 2024
12024
Improved Salp Swarm Algorithm with Transfer Learning Based Weed Detection for Smart Farming
HSA Hamatta
IEEE - ICAISS 2022 International Conference on Augmented Intelligence and …, 2022
12022
LLSFIoT: Lightweight Logical Security Framework for Internet of Things
SSA Isha Batra, Hatem S. A. Hamatta, Arun Malik, Mohammed Baz, Fahad R ...
Wireless Communications and Mobile Computing 2021, 9, 2021
1*2021
Novel approach for arabic spell-checker: Based on radix search tree
ALT Rasha, HSA Hamatta, H Muiadi
International Journal of Computer Applications 975, 8887, 2014
12014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20