Sign In
International Arab Journal
of e-Technology
IAJET
IAJET Home
Aims & Scope
Archive
IAJeT Vol. 1
IAJeT Vol. 2
IAJeT Vol. 3
IAJeT Vol. 4
IAJeT Vol. 5
Editorial Board
Technical Committee
Instruction to Authors
Preparing Final Manuscript
Contact Us
FAQ
Toggle Sidebar
IAJeT Vol. 1
Page Image
Page Content
IAJeT Vol. 1, No. 4
June 2010
Authentication Method Using Hand Images for Access Control systems
Raed Sahawneh, Ahmed Ibrahim, Sami Qawasmeh and Arwa Zabian.
On Line Isolated Characters Recognition Using Dynamic Bayesian Networks
Redouane Tlemsani and Abdelkader Benyettou.
A System of Umpires for Security of Wireless Mobile Ad Hoc Network
Ayyaswamy Kathirvel and, Rengaramanujam Srinivasan.
Senior Faculty Members' Attitudes in Jordanian Universities towards Using Information and Communication Technology
Mahmoud Abu Qudais, Mosleh Al-Adhaileh and Aieman Al-Omari.
Simple Scalar as an eLearning Mashup web application (eScalar)
Aiman Abu Samra and Adwan Abdelfattah.
Reviewing Speaker Recognition Influence in Strengthening VOIP Caller Authentication
Qutaiba Ali and Nada Abdul Ghani.
Effect of Electronic Interactive Technologies Usage on Services Marketing Activities Empirical Study on Banking Sector in Jordan
Zakaria A. Azzam , Nidal M. Alramahi.
Text Summarization Extraction System (TSES) Using Extracted Keywords
Rafeeq Al-Hashemi.
IAJeT Vol. 1, No. 3
January 2010
Applying Penetration Tests on a Highly Secured Cooperative Network
.
Qutaiba Ali, and Salah Alabady.
Performance Evaluation of RESTful Web Services for Mobile Devices
.
Hatem Hamad, Motaz Saad, and Ramzi Abed.
Push Pull Services Offering SMS Based m-Banking System in Context of Bangladesh
.
Fouzia Mousumi and Subrun Jamil.
An Effective Method for Fingerprint Classification
.
Monowar Hussain Bhuyan, Sarat Saharia, and Dhruba Kr Bhattacharyya.
Web Services Selection Based on Context Ontology and Quality of Services
.
Nabil Keskes, Ahmed Lehireche and Abdellatif Rahmoun.
Applying Electronic Supply Chain Management Using Multi-Agent System: A Managerial Perspective
.
Haitham Al-zu’bi.
IAJeT Vol. 1, No. 2
January 2009
An Empirical Study of Sources Affecting E-Business Value Creation in Jordanian Banking Services Sector
.
Ali. Alawneh and Ezz Hattab.
Applying Reliability Solutions to a Cooperative Network
.
Qutaiba Ali, Salah Alabady and Yehya Qasim.
Information Fusion Using Ontology-Based Communication between Agents
.
Tarek Sobh.
Design and Implementation of a Network Security Model for Cooperative Network
.
Salah Alabady.
Object Oriented Data Modeling for Data Warehousing (An Extension of UML approach to study Hajj pilgrim’s private tour as a Case Study).
Kamal Alaskar and Akhtar Shaikh.
On Analysis of Quantifying Learning Creativity Phenomenon Considering Brain Synaptic Plasticity
.
Hassan Mustafa.
Enhanced Authentication Mechanism Using Multilevel Security Model
.
Abdulameer Hussain.
E-Learning on the Cloud
.
Mohammed Al-Zoube.
IAJeT Vol. 1, No. 1
January 2009
How a Font Can Respect Basic Rules of Arabic Calligraphy
.
Abdelouahad Bayar and Khalid Sami.
Resource Optimization in Automatic web page classification using integrated feature selection and machine learning
.
Indra Mahadevan, Selvakuberan Karuppasamy and Rajaram Ramasamy.
Electronic Commerce Adoption in the Arab Countries – An Empirical Study
.
Robert J. Nathan.
Performance Evaluation of WLAN Internet Sharing Using DCF & PCF Modes
.
Qutaiba I. Ali.
Getting The Benefits Of ICTs In Tourism Destinations: Models, Strategies And Tools
.
Claudio Petti and Giuseppina Passiante.
Intelligent System for Worm Detection
.
Ibrahim A. Farag, Mohammed A. Shouman, Tarek S. Sobh and Heba Z. El-Fiqi.
Toward E-Knowledge Based Complaint Management
.
Samiha Mjahed and Abdelfatteh Triki.
Bandwidth-Delay Measurements of a Wireless Internet Service Providing (WISP) System
.
Qutaiba I. Ali and Ahmed Z. Saeed Al-wattar .
Copyright © 2022 Arab Open University - Jordan. All Rights Reserved.