default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 19 matches
- 2023
- Mustafa A. Al-Fayoumi, Hani Mahmoud Al-Mimi, Aryan Veisi, Hussain Al-Aqrabi, Mohammad Sh. Daoud, Ehsan Eftekhari-Zadeh:
Utilizing Artificial Neural Networks and Combined Capacitance-Based Sensors to Predict Void Fraction in Two-Phase Annular Fluids Regardless of Liquid Phase Type. IEEE Access 11: 143745-143756 (2023) - Rahmad B. Y. Syah, Aryan Veisi, Zainal Arifin Hasibuan, Mustafa A. Al-Fayoumi, Mohammad Sh. Daoud, Ehsan Eftekhari-Zadeh:
A Novel Smart Optimized Capacitance-Based Sensor for Annular Two-Phase Flow Metering With High Sensitivity. IEEE Access 11: 60709-60716 (2023) - 2021
- Ahmad Homsi, Joyce Al Nemri, Nisma Naimat, Hamzeh Abdul Kareem, Mustafa Al-Fayoumi, Mohammad Abu Snober:
Detecting Twitter Fake Accounts using Machine Learning and Data Reduction Techniques. DATA 2021: 88-95 - Rana Faek, Mohammad Al-Fawa'reh, Mustafa Al-Fayoumi:
Exposing Bot Attacks Using Machine Learning and Flow Level Analysis. DATA 2021: 99-106 - 2020
- Mustafa Al-Fayoumi, Jaber Alwidian, Mohammad Abusaif:
Intelligent Association Classification Technique for Phishing Website Detection. Int. Arab J. Inf. Technol. 17(4): 488-496 (2020) - 2019
- Hani Mahmouad AlMimi, Samar A. Shahin, Mohammad Sh. Daoud, Mustafa A. Al-Fayoumi, Yazeed Ghadi:
Enhanced E-Voting Protocol Based on Public Key Cryptography. ACIT 2019: 218-221 - 2018
- Ruba Mohammad Haj Hamad, Mustafa Al-Fayoumi:
Modernization of a Classical Data Center (CDC) vs. Adoption in Cloud Computing Calculate Total Cost of Ownership for Both Cloud and CDC - Jordanian Case Study. ACIT 2018: 1-8 - Ruba Mohammad Haj Hamad, Mustafa Al-Fayoumi:
Scalable Agile Transformation Process (SATP) to Convert Waterfall Project Management Office into Agile Project Management Office. ACIT 2018: 1-8 - 2016
- Anas Al-Fayoumi, Mohammad Hassan:
Interactive visual search system based onmachine learning algorithm. Int. Arab J. Inf. Technol. 13(1A): 190-195 (2016) - 2014
- Turki F. Al-Somani, Ayman G. Fayoumi, Mohammad K. Ibrahim:
An efficient and scalable postcomputation-based generic-point parallel scalar multiplication method. IEICE Electron. Express 11(19): 20140356 (2014) - Mohammad Sharif Daoud, Aladdin Ayesh, Mustafa A. Al-Fayoumi, Adrian A. Hopgood:
Location Prediction Based on a Sector Snapshot for Location-Based Services. J. Netw. Syst. Manag. 22(1): 23-49 (2014) - Mohammad Sh. Daoud, Adrian A. Hopgood, Mustafa A. Al-Fayoumi, Hani M. Mimi:
A new routing area displacement prediction for Location-Based Services based on an enhanced ant colony. SMC 2014: 3247-3252 - 2013
- Muazzam Siddiqui, Mohammad Fayoumi, Nidal Yousef:
A corpus based approach to find similar keywords for search engine marketing. Int. Arab J. Inf. Technol. 10(5): 460-466 (2013) - Mohammad Sh. Daoud, Aladdin Ayesh, Mustafa A. Al-Fayoumi, Adrian A. Hopgood:
An Enhanced Ant Colony Optimization for Routing Area Mobility Prediction over Cellular Communications Network. ICAART (2) 2013: 419-424 - 2011
- Mohammad Sh. Daoud, Aladdin Ayesh, Adrian A. Hopgood, Mustafa A. Al-Fayoumi:
A new splitting-based displacement prediction approach for location-based services. SMC 2011: 392-397 - 2010
- Mustafa Al-Fayoumi, Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi:
A New Digital Signature Scheme Based on Integer Factoring and Discrete Logarithm Problem. Int. J. Comput. Their Appl. 17(2): 108-115 (2010) - 2008
- Faruq A. Al-Omari, Nabeel I. Al-Fayoumi, Mohammad A. Al-Jarrah:
Image-mapped data clustering: An efficient technique for clustering large data sets. Intell. Data Anal. 12(6): 573-586 (2008) - Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi, Mustafa Al-Fayoumi, Haidar S. Jabbar:
An Efficient RSA Public Key Encryption Scheme. ITNG 2008: 127-130 - 2005
- Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi:
Two Efficient RSA Digital Multisignature and Blind Multisignature Schemes. Computational Intelligence 2005: 359-362
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-07 11:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint