Research on various cryptography techniques Y Alemami, MA Mohamed, S Atiewi International Journal of Recent Technology and Engineering (IJRTE) 8 (2S3 …, 2019 | 37 | 2019 |
Cloud data security and various cryptographic algorithms Y Alemami, AM Al-Ghonmein, KG Al-Moghrabi, MA Mohamed International Journal of Electrical and Computer Engineering 13 (2), 1867, 2023 | 20 | 2023 |
Speech encryption by multiple chaotic maps with fast fourier transform Y Alemami, MA Mohamed, S Atiewi, M Mamat International Journal of Electrical and Computer Engineering (IJECE) 10 (6 …, 2020 | 15 | 2020 |
Advanced approach for encryption using advanced encryption standard with chaotic map Y Alemami, MA Mohamed, S Atiewi Int. J. Electr. Comput. Eng 13 (2), 1708, 2023 | 11 | 2023 |
Pathological Voice Signal Analysis Using Machine Learning Based Approaches. Y Alemami, L Almazaydeh Comput. Inf. Sci. 11 (1), 8-13, 2018 | 4 | 2018 |
An Automatic Pronunciation of Definite Nouns for Arabic Words S Alazazmeh, L Almazaydeh, Y Alemami European Journal of Scientific Research 130 (3), 223 - 225, 2015 | | 2015 |
Portal Design and Application for the Hashemite Kingdom of Jordan YM Alemami PQDT-Global, 2012 | | 2012 |