Follow
hussein al ofeishat
hussein al ofeishat
Verified email at bau.edu.jo
Title
Cited by
Cited by
Year
Near field communication (NFC)
HA Al-Ofeishat, MAA Al Rababah
International Journal of Computer Science and Network Security (IJCSNS) 12 …, 2012
1052012
A parallel genetic algorithm for maximum flow problem
OM Surakhi, M Qatawneh, HA al Ofeishat
International Journal of Advanced Computer Science and Applications 8 (6), 2017
202017
A hybrid grey wolf optimiser algorithm for solving time series classification problems
HA Nsour, M Alweshah, AI Hammouri, HA Ofeishat, S Mirjalili
Journal of Intelligent Systems 29 (1), 846-857, 2019
182019
Proactive algorithm dynamic mobile structure of Routing protocols of ad hoc networks
AL Hussein, E Trad, T Al Smadi
IJCSNS 18 (10), 86-90, 2018
132018
A new parallel matrix multiplication algorithm on tree-hypercube network using iman1 supercomputer
O AbuAlghanam, M Qatawneh, HA al Ofeishat, O Adwan, A Huneiti
International Journal of Advanced Computer Science and Applications 8 (12), 2017
92017
Real-time programming platforms in the mainstream environments
HAA Ofeishat
International Journal of Computer Science and Network Security 9 (1), 197-204, 2009
62009
A Parallel Chemical Reaction Optimization Algorithm for MaxFlow Problem
HAO Mohammed Y. Alkhanafseh1, Mohammad Qatawneh1
International Journal of Computer Science and Information Security (IJCSIS …, 2017
22017
Scheduling in Heterogeneous Grid-Systems
HA Al-Ofeishat
Australian Journal of Basic and Applied Sciences 6 (10), 1-10, 2012
22012
AUTO-OPTIMIZATION IN SELF-ORGANIZING NETWORK (SON) FOR 4G LTE CELLULAR SYSTEMS.
HA AL OFEISHAT
Journal of Theoretical & Applied Information Technology 95 (20), 2017
12017
Dynamic Threshold Generalized Entropies-Based DDOS Detection Against Software-Defined Network Controller
HAA ofeishat
2024
ENHANCING ANDROID SECURITY: NETWORK-DRIVEN MACHINE LEARNING APPROACH FOR MALWARE DETECTION
HA AL-OFEISHAT
Journal of Theoretical and Applied Information Technology 102 (2), 2024
2024
A comparison study of three photovoltaic technologies in Jordan climate
A Samarah, H Al-Ofeishat, A Bagwari, A Amyrah, A Hiary
AIP Conference Proceedings 2930 (1), 2023
2023
Build a Secure Network using Segmentation and Micro-segmentation Techniques
H A Al-Ofeishat, R Alshorman
International Journal of Computing and Digital Systems 14 (1), 1-16, 2023
2023
Cryptoanalytic Method of Searching for the Secret Key and ITS Length on the Basis of Evolution Metaheuristics
H Al-Ofeishat
Journal of Engineering and Applied Sciences 15 (Issue: 1), 267-272, 2020
2020
Potential Study for Hofa Farm Development
GAS Ashraf Samarah, Hussein Al Ofeishat, Qatada Damra, Omayma Bani Salman
Innovative Systems Design and Engineering 8 (8), 34-48, 2017
2017
A New Parallel Matrix Multiplication Algorithm on Hex-Cell Network (PMMHC) Using IMAN1 Super Computer
E Rawashdeh, M Qatawneh, HA Al Ofeishat
International Journal of Computer Science & Information Technology (IJCSIT …, 2017
2017
Back-propagation and Radial Basis Function Neural Networks "A Comparative Study”
HA Al-Ofeishat
Australian Journal of Basic and Applied Sciences 9 (31), 576-581, 2015
2015
Effective Exploiting of Hardware Description Language as a Tool in Teaching the Digital and Computer Circuits
F Al-Shreef, A Al-Tarazi, HA Al-Ofeishat, AS Khaled
2013
The impact of client-server modalities on cryptography
H AHMAD
Oriental journal for computer science and technology 5 (2), 199-204, 2012
2012
Modified Hierarchical Method Planning Problems in Grid-Systems
H AL-ofeshat
Int. J. Contemp. Math. Sciences 7 (35), 1735-1748, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–20