Gradient-based optimizer (GBO): a review, theory, variants, and applications MS Daoud, M Shehab, HM Al-Mimi, L Abualigah, RA Zitar, ... Archives of Computational Methods in Engineering 30 (4), 2431-2449, 2022 | 27 | 2022 |
Hybridizing Cuckoo Search Algorithm for Extracting the ODF maxima in spherical harmonic representation S Mohammad, D Mohammad, AM Hani, A Laith, K Ahamad International Journal of Bio-Inspired Computation 13 (3), 2019 | 26* | 2019 |
Ruled Surfaces of Finite Chen-Type AZ Hassan, AZ Shadi, S Stylianos, A Hani Journal for Geometry and Graphics 22 (1), 15-20, 2018 | 24* | 2018 |
A Study on New Arduino NANO Board for WSN and IoT Applications H Almimi, A Aldahoud, M FEZARI, MS Daoud International Journal of advanced science and technology 29 (4), 10223–10230, 2020 | 22 | 2020 |
Distributed Text-to-Image Encryption Algorithm A Abusukhon, M Talib, HM Almimi International Journal of Computer Applications 106 (1), 1-5, 2014 | 20* | 2014 |
Performance evaluation of multicast ad hoc on-demand distance vector protocol W Al Mobaideen, HM Almimi, FA Masoud, E Qaddoura Computer Communications 30 (9), 1931-1941, 2007 | 20 | 2007 |
A New Approach for Resolving Cyber Crime in Network Forensics Based on Generic Process Model M Rasmi, A Jantan, HM Almimi ICIT13, vol 1, 2013 | 19 | 2013 |
The Role of Business Incubators s in Promoting Entrepreneurship of Higher Education Institutions F Rifai, H Al-mimi, MR Al-Mousa, A Aldahoud, BM AlWadi Journal of Namibian Studies, 0, 2023 | 8 | 2023 |
An Enhanced Intrusion Detection System for Protecting HTTP Services from Attacks H Al-Mimi, NA Hamad, MM Abualhaj, MS Daoud, A Al-dahoud, M Rasmi International Journal of Advances in Soft Computing and Its Applications 15 …, 2023 | 4 | 2023 |
Enhancing Bandwidth Utilization of IP Telephony over IPv6 Networks H Al-Mimi, Y Alrabanah, MM Abualhaj, SN Al-khatib Computer Systems Science and Engineering 44 (2), 1039-1049, 2022 | 4 | 2022 |
Enhanced E-Voting Protocol Based on Public Key Cryptography A Hani, S Samar, D Mohammad, F Mustafa, G Yazeed The 20th International Arab Conference on Information Technology (ACIT'2019), 2019 | 4 | 2019 |
A Survey on Single Scalar Point Multiplication Algorithms forElliptic Curves overPrime Fields M Rasmi, AA Sokhon, MS Daoud, HM AlMimi Journal of Computer Engineering 18 (2), 31-47, 2016 | 4 | 2016 |
A New Routing Area Displacement Prediction for Location-Based Services based on an Enhanced Ant Colony MS Daoud, A Hopgood, M Al-Fayoumi, HM AlMimi Systems, Man, and Cybernetics (SMC), 2014 IEEE International Conference, 2014 | 3 | 2014 |
Improved Intrusion Detection System to Alleviate Attacks on DNS Service H Al-Mimi, N Hamad, M Abualhaj, S Al-Khatib, M Hiari Journal of Computer Science 19 (12), 1549-1560, 2023 | 2 | 2023 |
A Model for the Disclosure of Probe Attacks Based on the Utilization of Machine Learning Algorithms H Al-Mimi, NA Hamad, MM Abualhaj International Conference on Computer Engineering, Technologies and …, 2023 | 2 | 2023 |
Elliptic Curve Scalar Multiplication Algorithm Using ZOT Structure HM Almimi, A Samsudin, S Jahani Security and Communication Networks 8 (6), 1141-1154, 2015 | 2 | 2015 |
Evaluating Composite EC Operations and their Applicability to the on-the-fly and non-window Multiplication Methods M Rasmi, HM Almimi, M Sharif International Journal of Computer Applications 105 (6), 19-26, 2014 | 2 | 2014 |
Elliptic Curve Point Multiplication Algorithm Using Precomputation HM Almimi, A Samsudin, S Jahani WSEAS Transactions on Computers 12 (11), 2013 | 2 | 2013 |
Utilizing Artificial Neural Networks and Combined Capacitance-Based Sensors to Predict Void Fraction in Two-Phase Annular Fluids Regardless of Liquid Phase Type M Al-Fayoumi, H Almimi, A Veisi, H Al-Aqrabi, MS Daoud, ... IEEE Access, 2023 | 1 | 2023 |
Intelligent Phishing Email Detection with Multi-Feature Analysis (IPED-MFA) R Abadla, A Alseiari, A Alheili, M Sh. Daoud, H M. Al-Mimi The International Conference on Intelligent Computing, Communication …, 2023 | 1 | 2023 |