Comparison between XGBoost, LightGBM and CatBoost using a home credit dataset E Al Daoud International Journal of Computer and Information Engineering 13 (1), 6-10, 2019 | 317 | 2019 |
Computer virus strategies and detection methods E Al Daoud, IH Jebril, B Zaqaibeh Int. J. Open Problems Compt. Math 1 (2), 12-20, 2008 | 99 | 2008 |
A New Addition Formula For Elliptic Curves Over GF(2^n) E Al-Daoud IEEE Transactions on Computers 51 (8), 972-975, 2002 | 95 | 2002 |
A Comparison Between Three Neural Network Models for E Al-Daoud Journal of artificial intelligence 2 (2), 56-64, 2009 | 49 | 2009 |
Cancer diagnosis using modified fuzzy network E Al-Daoud, E Al-Daoud Universal Journal of Computer Science and Engineering Technology 1 (2), 73-78, 2010 | 34 | 2010 |
A hybrid algorithm using a genetic algorithm and cuckoo search algorithm to solve the traveling salesman problem and its application to multiple sequence alignment E Al Daoud International Journal of Advanced Science and Technology 61, 29-38, 2013 | 32 | 2013 |
New empirical nonparametric kernels for support vector machine classification E Al Daoud, H Turabieh Applied Soft Computing 13 (4), 1759-1765, 2013 | 28 | 2013 |
Simplified features for email authorship identification EE Abdallah, AE Abdallah, M Bsoul, AF Otoom, E Al–Daoud International Journal of Security and networks 8 (2), 72-81, 2013 | 25 | 2013 |
Enhancement of the face recognition using a modified Fourier-Gabor filter JE Al Daoud Int. J. Advance. Soft Comput. Appl 1 (2), 2009 | 25 | 2009 |
A Framework to Automate the Parsing of Arabic Language Sentences. EA Daoud, A Basata International Arab Journal of Information Technology 6 (2), 191-195, 2009 | 21 | 2009 |
An efficient algorithm for finding a fuzzy rough set reduct using an improved harmony search E Al Daoud International Journal of Modern Education and Computer Science 7 (2), 16, 2015 | 20 | 2015 |
The Constraints of Object-Oriented Databases B Zaqaibeh, E Al Daoud Int. J. Open Problems Compt. Math 1 (1), 2, 2008 | 16 | 2008 |
Metamorphic viruses detection using artificial immune system E Al Daoud 2009 International Conference on Communication Software and Networks, 168-172, 2009 | 11 | 2009 |
Quantum Computing for Solving a System of Nonlinear Equations over GF (q). E Al-Daoud Int. Arab J. Inf. Technol. 4 (3), 201-205, 2007 | 11 | 2007 |
Mobile agents modelling using UML FA Hanandeh, I Alsmadi, MY Al-Shannag, E Al-Daoud International Journal of Business Information Systems 19 (4), 419-432, 2015 | 10 | 2015 |
Intrusion Detection Using a New Particle Swarm Method and Support Vector Machines E Al Daoud World Academy of Science, Engineering and Technology 77, 59-62, 2013 | 10 | 2013 |
Identifying DNA splice sites using patterns statistical properties and fuzzy neural networks E Al-Daoud | 10 | 2010 |
Detecting metamorphic viruses by using arbitrary length of control flow graphs and nodes alignment E Al Daoud, A Al-Shbail, A Al-Smadi UbiCC J 4 (3), 628-633, 2009 | 9 | 2009 |
Improving VANET's Performance by Incorporated Fog-Cloud Layer (FCL) G Samara, M Rasmi, NA Sweerky, E Al Daoud, AA Salem 2021 22nd International Arab Conference on Information Technology (ACIT), 1-5, 2021 | 6 | 2021 |
Integration of support vector machine and bayesian neural network for data mining and Classification E Al-Daoud World Academy of Science, Engineering and Technology 64, 202, 2010 | 6 | 2010 |