default search action
Ahmad Al-Khasawneh
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j34]Mohammad Wajeeh Alomari, Christophe Chesneau, Ahmad Al-Khasawneh:
Operator Jensen's Inequality for Operator Superquadratic Functions. Axioms 11(11): 617 (2022) - 2021
- [j33]Mais Haj Qasem, Nadim Obeid, Amjad Hudaib, Mohammed Amin Almaiah, Ali Al-Zahrani, Ahmad Al-Khasawneh:
Multi-Agent System Combined With Distributed Data Mining for Mutual Collaboration Classification. IEEE Access 9: 70531-70547 (2021) - [c3]Yousef O. Sharrab, Sana'a Al-shboul, Mohammad A. Alsmirat, Alá F. Khalifeh, Zyad Dwekat, Izzat Alsmadi, Ahmad Al-Khasawneh:
Performance Comparison of Several Deep Learning-Based Object Detection Algorithms Utilizing Thermal Images. IDSTA 2021: 16-22 - 2020
- [j32]Mohammed Amin Almaiah, Ahmad Al-Khasawneh:
Investigating the main determinants of mobile cloud computing adoption in university campus. Educ. Inf. Technol. 25(4): 3087-3107 (2020) - [j31]Mohammed Amin Almaiah, Ahmad Al-Khasawneh, Ahmad Althunibat:
Exploring the critical challenges and factors influencing the E-learning system usage during COVID-19 pandemic. Educ. Inf. Technol. 25(6): 5261-5280 (2020) - [j30]Mohammed Amin Almaiah, Ahmad Al-Khasawneh, Ahmad Althunibat, Saleh Khawatreh:
Mobile Government Adoption Model Based on Combining GAM and UTAUT to Explain Factors According to Adoption of Mobile Government Services. Int. J. Interact. Mob. Technol. 14(3): 199-225 (2020) - [j29]Anas Ibrahim, Alexander G. Chefranov, Nagham Hamad, Yousef-Awwad Daraghmi, Ahmad Al-Khasawneh, Joel J. P. C. Rodrigues:
NTRU-Like Random Congruential Public-Key Cryptosystem for Wireless Sensor Networks. Sensors 20(16): 4632 (2020) - [c2]Bashar Hammad, Abdallah Al-Zoubi, Haneen Hijazi, Ahmad Al-Khasawneh:
Student-Centered Engineering Education: The Renewable Energy Case. EDUCON 2020: 477-486
2010 – 2019
- 2016
- [j28]Ahmad Al-Khasawneh:
Diagnosis of Breast Cancer Using Intelligent Information Systems Techniques. Int. J. E Health Medical Commun. 7(1): 65-75 (2016) - [j27]Ayoub Alsarhan, Ahmad Al-Khasawneh:
Resource trading in cloud environments for utility maximisation using game theoretic modelling approach. Int. J. Parallel Emergent Distributed Syst. 31(4): 319-333 (2016) - 2015
- [j26]Ahmad Al-Khasawneh, Bashar K. Hammad:
Implementation of service learning and civic engagement for students of computer information systems through a course project at the Hashemite University. Educ. Inf. 31(4): 181-193 (2015) - [j25]Sa'ed Abed, Ashraf Hasan Bqerat, Ahmad Al-Khasawneh, Ayoub Alsarhan, Ibrahim Obeidat:
Towards improving the performance of distributed virtual memory based reversal cache approach. Int. J. Comput. Appl. Technol. 51(3): 247-256 (2015) - [j24]Ahmad Al-Khasawneh:
A Method for Classification Using Data Mining Technique for Diabetes: A Study of Health Care Information System. Int. J. Heal. Inf. Syst. Informatics 10(3): 1-23 (2015) - [j23]Ahmad Al-Khasawneh, Randa Ali Obeidallah:
Factors Contributing to E-Learning Success: A Case Study in The Hashemite University. Int. J. Inf. Commun. Technol. Educ. 11(3): 30-38 (2015) - [j22]Alaa Eddien Abdallah, Emad Eddien Abdallah, Mohammad Bsoul, Ahmad Al-Khasawneh, Lina Amer:
A blind 3D watermarking technique using spherical coordinates and skewness measure. Int. J. Secur. Networks 10(1): 1-8 (2015) - [c1]Ahmad Al-Khasawneh:
Toward power consumption in partitioned Wireless Sensors Networks routing technique. ICITST 2015: 238-241 - 2014
- [j21]Ahmad Al-Khasawneh, Khalid T. Al-Sarayreh, Kenza Meridji:
Towards a framework for quantifying system non-functional data definition and database requirements. Int. J. Data Anal. Tech. Strateg. 6(2): 162-187 (2014) - [j20]Ahmad Al-Khasawneh, Haneen Hijazi:
A Predictive E-Health Information System: Diagnosing Diabetes Mellitus Using Neural Network Based Decision Support System. Int. J. Decis. Support Syst. Technol. 6(4): 31-48 (2014) - [j19]Sahel Alouneh, Sa'ed Abed, Bassam Jamil Mohd, Ahmad Al-Khasawneh:
Software comprehension based on database relational algebra. Int. J. Inf. Commun. Technol. 6(1): 58-70 (2014) - [j18]Ahmad Al-Khasawneh, Randa Ali Obeidallah:
Challenges to the Successful Implementation of Online Voting for E-Democracy in Developing Countries' Initiatives: Jordan as a Case Study. Int. J. Sociotechnology Knowl. Dev. 6(3): 45-59 (2014) - [j17]Mohammad Bsoul, Ayoub Alsarhan, Ahmed F. Otoom, Maen Hammad, Ahmad Al-Khasawneh:
A dynamic replication strategy based on categorization for Data Grid. Multiagent Grid Syst. 10(2): 109-118 (2014) - 2013
- [j16]Ahmad Al-Khasawneh, Bashar K. Hammad:
Implementation of service learning and civic engagement for computer information systems students through a course project at the Hashemite University. Educ. Inf. 30(3-4): 191-203 (2013) - [j15]Yousef Kilani, Mohammad Bsoul, Ayoub Alsarhan, Ahmad Al-Khasawneh:
A survey of the satisfiability-problems solving algorithms. Int. J. Adv. Intell. Paradigms 5(3): 233-256 (2013) - [j14]Ayoub Alsarhan, Anjali Agarwal, Ibrahim Obeidat, Mohammad Bsoul, Ahmad Al-Khasawneh, Yousef Kilani:
Optimal spectrum utilisation in cognitive network using combined spectrum sharing approach: overlay, underlay and trading. Int. J. Bus. Inf. Syst. 12(4): 423-454 (2013) - [j13]Ahmad Al-Khasawneh, Khalid T. Al-Sarayreh, Kenza Meridji, Mohammad Khasawneh:
A generic measurement model for system data definition and database requirements. Int. J. Comput. Appl. Technol. 47(4): 305-313 (2013) - [j12]Ahmad Al-Khasawneh, Khalid T. Al-Sarayreh, Kenza Meridji:
A standards-based framework of software configuration derived from system requirements. Int. J. Comput. Appl. Technol. 48(1): 14-26 (2013) - [j11]Kenza Meridji, Khalid T. Al-Sarayreh, Ahmad Al-Khasawneh:
A generic model for the specification of software reliability requirements and measurement of their functional size. Int. J. Inf. Qual. 3(2): 139-163 (2013) - [j10]Emad Eddien Abdallah, Alaa Eddien Abdallah, Ahmad Al-Khasawneh, Mohammad Bsoul, Ayoub Alsarhan:
Secure local algorithm for establishing a virtual backbone in 3D ad hoc network. Int. J. Netw. Virtual Organisations 12(1): 70-83 (2013) - [j9]Ahmad Al-Khasawneh, Khalid T. Al-Sarayreh, Kenza Meridji, Mohammad Khasawneh:
Model of system configuration requirements and measurement of their functional size. Int. J. Netw. Virtual Organisations 12(3): 201-216 (2013) - [j8]Ibrahim Obeidat, Ahmad Al-Khasawneh, Mohammad Bsoul, Yousef Kilani:
Toward power consumption in wireless sensor networks routing technique. Int. J. Netw. Virtual Organisations 12(3): 238-250 (2013) - [j7]Ayoub Alsarhan, Ahmad Al-Khasawneh, Awni Itradat, Mohammad Bsoul:
Economic model for routing and spectrum management in cognitive wireless mesh network. Int. J. Netw. Virtual Organisations 12(4): 331-351 (2013) - [j6]Mohammad Bsoul, Ahmad Al-Khasawneh, Alaa Eddien Abdallah, Emad Eddien Abdallah, Ibrahim Obeidat:
An Energy-Efficient Threshold-Based Clustering Protocol for Wireless Sensor Networks. Wirel. Pers. Commun. 70(1): 99-112 (2013) - 2012
- [j5]Mohammad Bsoul, Ahmad Al-Khasawneh, Yousef Kilani, Ibrahim Obeidat:
A threshold-based dynamic data replication strategy. J. Supercomput. 60(3): 301-310 (2012) - 2011
- [j4]Mohammad Bsoul, Ahmad Al-Khasawneh, Emad Eddien Abdallah, Yousef Kilani:
Enhanced Fast Spread Replication strategy for Data Grid. J. Netw. Comput. Appl. 34(2): 575-580 (2011) - 2010
- [j3]Ahmad Al-Khasawneh, Mohammad Bsoul:
Job scheduling in economic grid environments. Int. J. Inf. Commun. Technol. 2(3): 220-227 (2010) - [j2]Ahmad Al-Khasawneh:
Mobile computing in Jordan: a roadmap to wireless. Int. J. Inf. Technol. Manag. 9(3): 260-272 (2010)
2000 – 2009
- 2008
- [j1]Sahar A. Idwan, Suad Alramouni, Mosleh Hmoud Al-Adhaileh, Ahmad Al-Khasawneh:
Enhancing mobile advertising via Bluetooth technology. Int. J. Mob. Commun. 6(5): 587-597 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint