Analysis of color image features extraction using texture methods | Aws AlQaisi
Mokhled AlTarawneh
Ziad A. Alqadi
Ahmad A. Sharadqah | TELKOMNIKA, Vol.17, No.3, June2019, pp.1220~1225 | Vol.17, No.3, June2019, pp.1220~1225 | Institute of Advanced Engineering and Science (IAES) | Click Here | Journal | 2019 |
|
A Private Cloud Implementation for Jordanian Universities Cloud Computing: E-Learning Center of Excellence as a Service | | Conference: The 5th International Conference on Digital Information Processing, E-Business and Cloud Computing (DIPECC2018) | | Conference: The 5th International Conference on Digital Information Processing, E-Business and Cloud Computing (DIPECC2018)At: Avrasya University, Trabzon, Turkey | | Conference | 2019 |
|
A HYBRID METHOD FOR EXUDATES DETECTION USING CHAIN PROCESSING BY WATERSHED SEGMENTATION AND K-MEANS CLUSTERING | MOKHLED S. ALTARAWNEH | Journal of Theoretical and Applied Information Technology | Vol97No3/ PP.775 -786 | Journal of Theoretical and Applied Information Technology | | Journal | 2019 |
|
A Secure Exchange Technique for Secret Information and Encryption Key Using Hybrid System | Jamal Nahar Bani Salameh
Mokhled Al Tarawneh
| International Journal on Communications Antenna and Propagation (IRECAP), Vol 9, No 1 (2019) | Vol 9, No 1 | Praise Worthy Prize | Click Here | Journal | 2019 |
|
Integrative Model for Quantitative Evaluation of Selection Telecommunication Tower Site | Janah A. Asassfeh
Mokhled AlTarawneh
Fadiya Samson | TELKOMNIKA, Vol.16, No.3, June 2018, pp. 1158~1164 | Vol.16, No.3, pp. 1158~1164 | Institute of Advanced Engineering and Science (IAES) | Click Here | Journal | 2018 |
|
CANCELABLE FINGERPRINT FEATURES USING CHAFF POINTS ENCAPSULATION | Mokhled Sueliman Altarawneh | Informatica | Vol 42, No 3 (2018) | Slovenian Society Informatika | Click Here | Journal | 2018 |
|
An empirical investigation of olive leave spot disease using auto-cropping segmentation and fuzzy C-means classification | Mokhled S. Al-Tarawneh | World Applied Sciences Journal | 23 (9): 1207-1211, 2013 | IDOSI Publications, 2013 | Click Here | Journal | 2013 |
|
An Empirical Study on the Security Measurements of Websites of Jordanian Public Universities | Mokhled S. Al-Tarawneh | International Journal of Computer Science and Security (IJCSS), | Volume (7) : Issue (4) : PP 127-136 | | | Journal | 2013 |
|
Lung cancer detection using image processing techniques | M. S. AlTarawneh | Leonardo Electronic Journal of Practices and Technologies | Issue 20, January-June 2012 -PP. 147-158 | Leonardo Electronic Journal of Practices and Technologies | Click Here | Journal | 2012 |
|
Crypto Key Generation Based on Signature Biometric Using Gabor Features Selection | AL-TARAWNEH Mokhled | Journal of Computer Science and Control Systems | Volume 4, Number 1: PP13-18 | Academy of Romanian Scientists | | Journal | 2011 |
|
Signature region of interest using auto cropping | Bassam Al-Mahadeen
Mokhled S. AlTarawneh
Islam H. AlTarawneh | nternational Journal of Computer Science | IJCSI, Volume 7, Issue 2, March 2010 | Computer Vision and Pattern Recognition | Click Here | Journal | 2010 |
|
Biometric Key Capsulation Technique Based on Fingerprint Vault: Anatomy and attack | M.S. AlTarawneh
W.L. Woo
S.S. Dlay | 3rd International Conference on Information and Communication Technologies: From Theory to Applications | 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications | IEEE | Click Here | Journal | 2008 |
|
A NON Reference Fingerprint Image Validity via Statistical Weight Calculation | M.S. Altarawneh
L.C.Khor
W.L.Woo
S.S Dlay | Journal of Digital Information Management | V5:Issue4- PP:220-225 | Digital Information Research Foundation | Click Here | Journal | 2007 |
|
CRYPTO KEY GENERATION USING CONTOUR GRAPH ALGORITHM | M.S. ALTARAWNEH
L.C.KHOR
W.L.WOO
S.S DLAY | Proceedings of the 24th IASTED international conference on Signal processing, pattern recognition, and applications
| The 24th IASTED international conference on Signal processing, pattern recognition, and applications | The 24th IASTED international conference on Signal processing, pattern recognition, and applications | Click Here | Journal | 2006 |
|
Crypto Key Generation Using Slicing Window Algorithm | M.S. Altarawneh
L.C. Khor
W.L. Woo
S.S. Dlay | COMMUNICATION SYSTEMS, NETWORKS AND DIGITAL SIGNAL PROCESSING Fifth International Symposium | COMMUNICATION SYSTEMS, NETWORKS AND DIGITAL SIGNAL PROCESSING Fifth International Symposium | CSNDSP | Click Here | Journal | 2006 |
|