


default search action
International Arab Journal of e-Technology, Volume 1
Volume 1, Number 1, January 2009
- Abdelouahad Bayar, Khalid Sami:

How a Font Can Respect Basic Rules of Arabic Calligraphy. 1-18 - Indra Mahadevan, Selvakuberan Karuppasamy, Rajaram Ramasamy:

Resource Optimization in Automatic web page classification using integrated feature selection and machine learning. 19-28 - Robert Jeyakumar Nathan:

Electronic Commerce Adoption in the Arab Countries - An Empirical Study. 29-37 - Qutaiba I. Ali:

Performance Evaluation of WLAN Internet Sharing Using DCF & PCF Modes. 38-45 - Claudio Petti, Giuseppina Passiante:

Getting The Benefits Of ICTs In Tourism Destinations: Models, Strategies And Tools. 46-57 - Ibrahim Farag, Mohamed A. Shouman, Tarek S. Sobh, Heba El-Fiqi:

Intelligent System for Worm Detection. 58-67 - Samiha Mjahed, Abdelfattah Triki:

Toward E-Knowledge Based Complaint Management. 68-82 - Qutaiba I. Ali, Ahmed Z. Saeed Al-wattar:

Bandwidth-Delay Measurements of a Wireless Internet Service Providing (WISP) System. 83-89
Volume 1, Number 2, June 2009
- Ali Alawneh, Ezz Hattab:

An Empirical Study of Sources Affecting E-Business Value Creation in Jordanian Banking Services Sector. 1-8 - Qutaiba Ali, Salah Alabady, Yehya Qasim:

Applying Reliability Solutions to a Cooperative Network. 9-17 - Tarek S. Sobh:

Information Fusion Using Ontology-Based Communication between Agents. 18-25 - Salah Alabady:

Design and Implementation of a Network Security Model for Cooperative Network. 26-36 - Kamal Alaskar, Akhtar Shaikh:

Object Oriented Data Modeling for Data Warehousing (An Extension of UML approach to study Hajj pilgrim's private tour as a Case Study). 37-41 - Hassan Mustafa:

On Analysis of Quantifying Learning Creativity Phenomenon Considering Brain Synaptic Plasticity. 42-48 - Abdulameer Hussain:

Enhanced Authentication Mechanism Using Multilevel Security Model. 49-57 - Mohammed Al-Zoube:

E-Learning on the Cloud. 58-64
Volume 1, Number 3, January 2010
- Qutaiba Ali, Salah Alabady:

Applying Penetration Tests on a Highly Secured Cooperative Network. 65-71 - Hatem Hamad, Motaz Saad, Ramzi Abed:

Performance Evaluation of RESTful Web Services for Mobile Devices. 72-78 - Fouzia Mousumi, Subrun Jamil:

Push Pull Services Offering SMS Based m-Banking System in Context of Bangladesh. 79-88 - Monowar Hussain Bhuyan, Sarat Saharia, Dhruba K. Bhattacharyya:

An Effective Method for Fingerprint Classification. 89-97 - Nabil Keskes, Ahmed Lehireche, Abdellatif Rahmoun:

Web Services Selection Based on Context Ontology and Quality of Services. 98-105 - Haitham Al-zu'bi:

Applying Electronic Supply Chain Management Using Multi-Agent System: A Managerial Perspective. 106-113
Volume 1, Number 4, June 2010
- Raed Sahawneh, Ahmed Ibrahim, Sami Qawasmeh, Arwa Zabian:

Authentication Method Using Hand Images for Access Control systems. 115-120 - Redouane Tlemsani, Abdelkader Benyettou:

On Line Isolated Characters Recognition Using Dynamic Bayesian Networks. 121-128 - Ayyaswamy Kathirvel, Rengaramanujam Srinivasan:

A System of Umpires for Security of Wireless Mobile Ad Hoc Network. 129-134 - Mahmoud Abu Qudais, Mosleh Al-Adhaileh, Aieman Al-Omari:

Senior Faculty Members' Attitudes in Jordanian Universities towards Using Information and Communication Technology. 135-141 - Aiman Abu Samra, Adwan Abdelfattah:

Simple Scalar as an eLearning Mashup web application (eScalar). 142-146 - Qutaiba Ali, Nada Abdul Ghani:

Reviewing Speaker Recognition Influence in Strengthening VOIP Caller Authentication. 147-153 - Zakaria A. Azzam, Nidal M. Alramahi:

Effect of Electronic Interactive Technologies Usage on Services Marketing Activities Empirical Study on Banking Sector in Jordan. 154-163 - Rafeeq Al-Hashemi:

Text Summarization Extraction System (TSES) Using Extracted Keywords. 164-168

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














