MID-Crypt: a cryptographic algorithm for advanced medical images protection A Ahmad, Y AbuHour, R Younisse, Y Alslman, E Alnagi, Q Abu Al-Haija Journal of Sensor and Actuator Networks 11 (2), 24, 2022 | 15 | 2022 |
Two improved classes of Broyden's methods for solving nonlinear systems of equations MH Al-Towaiq, YS Abu Hour JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS 17 (1), 22-31, 2017 | 10 | 2017 |
Hybrid encryption scheme for medical imaging using autoencoder and advanced encryption standard Y Alslman, E Alnagi, A Ahmad, Y AbuHour, R Younisse, Q Abu Al-haija Electronics 11 (23), 3967, 2022 | 7 | 2022 |
Two Improved Methods Based on Broyden’s Newton Methods for the Solution of Nonlinear System of Equations MH Al-Towaiq, YSA Hour Journal of Engineering and Applied Sciences 11 (11), 2344-2348, 2016 | 5 | 2016 |
Enhanced and authenticated cipher block chaining mode YS Alslman, A Ahmad, Y AbuHour Bulletin of Electrical Engineering and Informatics 12 (4), 2357-2362, 2023 | 3 | 2023 |
A novel covid-19 prediction model with optimal control rates A Ahmed, Y AbuHour, A El-Hassan Intelligent Automation and Soft Computing, 979-990, 2022 | 3 | 2022 |
Residual power series technique for solving Fokker-Planck equation MH DarAssi, YA Hour Italian Journal of Pure and Applied Mathematics 44, 319-332, 2020 | 3 | 2020 |
A Novel Model for Distributed Denial of Service Attack Analysis and Interactivity A Ahmad, Y AbuHour, F Alghanim Symmetry 13 (12), 2443, 2021 | 2 | 2021 |
Reduce Effect of Dependent Malicious Sensor Nodes in WSNs using Pairs Counting and Fake Packets A Ahmad, M Hababeh, A Abu-Hantash, Y AbuHour, H Musleh INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL 15 (5), 2020 | 2 | 2020 |
An optimal control model for Covid-19 spread with impacts of vaccination and facemask A ElHassan, Y AbuHour, A Ahmad Heliyon, 2023 | 1 | 2023 |
A mathematical study of the omicron variant in a discrete-time Covid-19 model MH DarAssi, S Damrah, Y AbuHour The European Physical Journal Plus 138 (7), 1-18, 2023 | 1 | 2023 |
Effects of computer networks' viruses under the of removable devices A Ahmad, Y Abu-Hour, MH DarAssi International Journal of Dynamical Systems and Differential Equations 10 (3 …, 2020 | 1 | 2020 |
Hate speech detection in the Arabic language: corpus design, construction, and evaluation A Ahmad, M Azzeh, E Alnagi, Q Abu Al-Haija, D Halabi, A Aref, ... Frontiers in Artificial Intelligence 7, 1345445, 2024 | | 2024 |
An Efficient Approach of the Fractional Lagrange Interpolation MH Al-Towaiq, YSA Hour Journal of Engineering and Applied Sciences 15 (3), 815-818, 2020 | | 2020 |
Advance System and Model to Predict Malicious Files Prorogation inside Computer Network A Ahmad, Y Abu Hour, M DarAssi IET Networks 8 (1), 38-47, 2018 | | 2018 |
An optimal control model for Covid-19 spread with impacts of vaccination and facemask A ElHassan, Y AbuHour, A Ahmad | | |