Predicting Student Performance in Higher Education Institutions Using Decision Tree Analysis WAA AK Hamoud, AS Hashim International Journal of Interactive Multimedia and Artificial Intelligence …, 2018 | 209 | 2018 |
Student performance prediction model based on supervised machine learning algorithms AS Hashim, WA Awadh, AK Hamoud IOP conference series: materials science and engineering 928 (3), 032019, 2020 | 97 | 2020 |
Students’ Success Prediction based on Bayes Algorithms ASH Alaa Khalaf Hamoud, Aqeel Majeed, Wid Akeel Awadh International Journal of Computer Applications 178 (7), 6-12, 2017 | 46 | 2017 |
Clinical data warehouse: a review A Hamoud, AS Hashim, WA Awadh Iraqi Journal for Computers and Informatics 44 (2), 2018 | 35 | 2018 |
Analyzing students’ answers using association rule mining based on feature selection AS Hashima, AK Hamoud, WIDA Awadh Journal of Southwest Jiaotong University 53 (5), 2018 | 29 | 2018 |
A review of various steganography techniques in cloud computing WA Awadh, AS Hashim, A Hamoud University of Thi-Qar Journal of Science 7 (1), 113-119, 2019 | 13 | 2019 |
OLAP Mining with Educational Data Mart to Predict Students’ Performance IA Najm, JM Dahr, AK Hamoud, AS Alasady, WA Awadh, MBM Kamel, ... Informatica 46 (5), 2022 | 11 | 2022 |
Predictions of COVID-19 spread by using supervised data mining techniques WA Awadh, AS Alasady, HI Mustafa Journal of Physics: Conference Series 1879 (2), 022081, 2021 | 11 | 2021 |
Supervised learning algorithms in educational data mining: A systematic review A Khalaf, JM Dahr, IA Najim, MBM Kamel, AS Hashim, WA Awadh, ... Southeast Europe Journal of Soft Computing 10 (1), 55-70, 2021 | 11 | 2021 |
Using Steganography for Secure Data Storage in Cloud Computing W Awadh, A Alasady International Research Journal of Engineering and Technology (IRJET) 4 (4 …, 2017 | 10 | 2017 |
Hybrid information security system via combination of compression, cryptography, and image steganography WA Awadh, AS Alasady, AK Hamoud International Journal of Electrical and Computer Engineering 12 (6), 6574, 2022 | 9 | 2022 |
A comparative study to obtain an adequate model in prediction of electricity requirements for a given future period M Abd Ulkareem, WA Awadh, AS Alasady 2018 International Conference on Engineering Technology and their …, 2018 | 8 | 2018 |
Steganography in MS Excel Document Using Unicode System Characteristics AS Saber, WA Awadh Journal of Basrah Researches ((Sciences)) Vol 39 (1), 2013 | 8 | 2013 |
A New Text Steganography Method by Using Non-Printing Unicode Characters and Unicode System Characteristics in English/Arabic documents A Saber, W Awadh JOURNAL OF THI-QAR (SCIENCE) 3 (3), 192-200, 2012 | 7 | 2012 |
A review on internet of things architecture for big data processing WA Awadh, AS Hashim, AK Hamoud Iraqi Journal for Computers and Informatics 46 (1), 12-20, 2020 | 5 | 2020 |
Investigation of Security and Privacy Methods for Public Mobile Cloud Computing ASHWA Awadh Journal of Engineering and Applied Sciences 13 (12), 4396-4402, 2018 | 3 | 2018 |
A prediction model based machine learning algorithms with feature selection approaches over imbalanced dataset AK Hamoud, MBM Kamel, AS Gaafar, AS Alasady, AM Humadi, ... Indonesian Journal of Electrical Engineering and Computer Science 28 (2 …, 2022 | 2 | 2022 |
Efficiently Secure Data Communications Based on CBC-RC6 and the Overflow Field of Timestamp Option in an IPv4 Packet WA Awadh, AS Hashim, AK Hamoud Informatica 46 (6), 2022 | 2 | 2022 |
A multilayer model to enhance data security in cloud computing WA Awadh, AS Alasady, MS Hashim Indonesian Journal of Electrical Engineering and Computer Science 32 (2 …, 2023 | 1 | 2023 |
A comparative study of supervised/unsupervised machine learning algorithms with feature selection approaches to predict student performance AK Hamoud, AS Alasady, WA Awadh, JM Dahr, MBM Kamel, AM Humadi, ... International Journal of Data Mining, Modelling and Management 15 (4), 393-409, 2023 | 1 | 2023 |