Your search returned 285 results. Subscribe to this search

|
1. A Comparative Study of Indexing Techniques for Relational Database Management Systems / by Rashidi, Huda Auesh Al . Publication: . 101 P. Availability: No items available:

2. Framework Model of Integration xRM with GIS / by Asrawi, Mohammad Mahmoud . Publication: Amman 2016 . 86 P. Date: 2016 Availability: No items available:

3. Proposed Model for Software Configuration Management Theoretical Tool / by Shaikhly, Yousef Salman Al . Publication: . 130 P. Availability: No items available:

4. Secure Authentication Protocol and Key Agreement for Mobile Networks Using Public-Key Cryptography / by Fayoumi, Haneen Mohammed Al . Publication: Amman 2016 . 121 P. Date: 2016 Availability: No items available:

5. Performance Evaluation of Similarity Functions for Duplicate Record Detection / by Alnoory, Methaq Kadhum . Publication: . 84 P. Availability: No items available:

6. Towards Achieving, Self-Load Balancing In Autonomic Overlay Networks / by Zboon, Mwafaq Salim Al . Publication: . 128 P. Availability: No items available:

7. Evaluation of Marlins Study Pack 1 Textbook from Teachers' and Students' Perspectives / by Zuwayyed, Diana Adnan . Publication: Amman : Middle East University ; 2011 . 133 P. Date: 2011 Availability: No items available:

8. Native Speakers' Intelligibility of and Attitudes Toward Jordanian And Foreign English Speech / by Jaber, Maysa . Publication: 2010 . 122 P. Date: 2010 Availability: No items available:

9. Investigating the Relationship between Customer Knowledge Management and Customer Agility: The Mediating Effect of Marketing Capabilities in Five-Star Hotels in Amman by Melhem, Raya Publication: Amman: 2016 . 138 p. Date: 2016 Availability: No items available:

10. Factors Affecting the word of mouth on telecommunication services providers in Amman   Publication: Amman 2016 . 82 p. Date: 2016 Availability: No items available:

11. Task Scheduling Using Best-Level-Job-First on private cloud computing by Aridah, Mohammad Ibrahim Publication: Amman 2016 . 86 p. Date: 2016 Availability: No items available:

12. Image Encryption system by Generating chains from the Secret Key by Al-Jabali, May Fawaz Publication: Amman 2016 . 73 p. Date: 2016 Availability: No items available:

13. Performance Analysis for Hashing Over Encrypted data Techniques by Al-Rawashdeh, Esra'a Sameer Publication: Amman 2016 . 112 p. Date: 2016 Availability: No items available:

14. A Study of Cultural bias in Journalistic Translation from English into Arabic and Vice Versa by Saidan, Jafar Ibrahim Publication: Amman 2016 . 96 p. Date: 2016 Availability: No items available:

15. The Attitudes of English Teachers toward Educational Technology in Teaching English and their Relation to the Degree of its Utilization in Primary Schools in the Governorate of Baghdad by Sulaiman, Omar ibrahim Publication: Amman 2017 . 110 p. Date: 2017 Availability: No items available:

16. Modified Random Early detection (RED) Technique using various congestion Indicators/ by Ali, Mohammad Ramez Abbas Publication: Amman: 2017 . 84P. Date: 2017 Availability: No items available:

17. Accuracy Evaluation of Brain Tumor Detection using Entropy-based image Thresholding by Alyahya, Amal .Q. Publication: Amman: 2017 . 83 P. Date: 2017 Availability: No items available:

18. The Moderating effect of moral Intelligence on the relationship between Leadership competencies and Organizational Reputation : Case study: International Organization for Migration by Al-Raqqad, Rand Khalaf Abdel Karim Publication: Amman: 2016 . 93 P. Date: 2016 Availability: No items available:

19. Enhanced Distributed Defense Mechanism Against Volumetric DDoS Attacks by Melhem, Emad Bani Publication: Amman 2016 . 71 p Date: 2016 Availability: No items available:

20. Adoption conceptual framework based on agility and flexibity in cloud computing system by Farhan, Mustafa Awad Publication: Amman 2017 . 59 p Date: 2017 Availability: No items available:

Powered by Koha