Your search returned 136 results. Subscribe to this search

|
1. Mathematical investigation of linear control systems containing input derivatives / by al, Nazar . Publication: {new york} : Nazar al- nasr, 1981 . 85 P. Date: 1981 Availability: No items available:

2. Graph theory applications to architecture / by heinssen, Dennis k. . Publication: {New york} : Dennis k. heinssen, 1984 . 140 P. Date: 1984 Availability: No items available:

3. Design Secure E-Voting Scheme / by Hnaity, Omar Al . Publication: Amman : 2008 Date: 2008 Availability: No items available:

4. Percluding Software Piracy Using Asymmetric Cryptography / by Jabber, Zeana Satter . Publication: عمان : 2009 . 64 P. Date: 2009 Availability: No items available:

5. A Model For E-Learnhng Content Design / by Aljaafreh, Rasha faiq Suliman . Publication: Amman : 2009 . 65 P. Date: 2009 Availability: No items available:

6. Desining A model For Wireless Load Data sheet In Aircraft / by Yousefd, Mohammad Ahme Mahmoud . Publication: Amman : 2010 . 90 P. Date: 2010 Availability: No items available:

7. A Robust Framework for Watermarking System / by Alshamary, Adham mohsin Seed . Publication: Amman : 2010 . 61 P. Date: 2010 Availability: No items available:

8. Design A Model for Dynamic workflow Management System / by Hudeib, yazan Waleed Ahmad . Publication: Amman : 2010 . 50 P. Date: 2010 Availability: No items available:

9. Anonymous and non-repudiation E-cash scheme based on partially blind sigature / by almatari, hani M. . Publication: . 130 P. Availability: No items available:

10. The effectiveness of haar features threshold in multiple face detection systems based on adaboost algorithm / by alnoori, khadija mustafa khalil . Publication: . 80 P. Availability: No items available:

11. A secure electronic voting scheme based on evox-MA and revs voting blind signature protocols / by alsaidi, reem ali . Publication: . 126 P. Availability: No items available:

12. A Comparative Study of Indexing Techniques for Relational Database Management Systems / by Rashidi, Huda Auesh Al . Publication: . 101 P. Availability: No items available:

13. an efficient digital image watermarking system based on contourlet transform and discrete wavelet transform / by alqudsy, zainab nouman yousif . Publication: . 87 P. Availability: No items available:

14. an intelligent agent model and a simulation for a given task specific environment / by hadba, safa'a yousef abo . Publication: . 90 P. Availability: No items available:

15. Mobile Trade Agent Security / by alqudsy, zainab nouman yousif . Publication: . 74 P. Availability: No items available:

16. Framework Model of Integration xRM with GIS / by Asrawi, Mohammad Mahmoud . Publication: Amman 2016 . 86 P. Date: 2016 Availability: No items available:

17. Proposed Model for Software Configuration Management Theoretical Tool / by Shaikhly, Yousef Salman Al . Publication: . 130 P. Availability: No items available:

18. Secure Authentication Protocol and Key Agreement for Mobile Networks Using Public-Key Cryptography / by Fayoumi, Haneen Mohammed Al . Publication: Amman 2016 . 121 P. Date: 2016 Availability: No items available:

19. Performance Evaluation of Blocking Methods for Duplicate Record Detection / by Dummor, Raed Mahmmod Al . Publication: . 98 P. Availability: No items available:

20. Performance Evaluation of Similarity Functions for Duplicate Record Detection / by Alnoory, Methaq Kadhum . Publication: . 84 P. Availability: No items available:

Powered by Koha