Your search returned 14 results.

|
1. The Proceedings of the 5th International Arab Conference on Information Technology(Acit 2004),December 12-15,2004 / by Technology, International Arab Conferen on Information . Publication: Zarqa,Jordan : Arab Conference on Information Technology, 2004 . 451 P. Date: 2004 Availability: Items available: Library - Middle East University (2),

2. The Proceedings of The 2002 International Arab Conference on Information Technology (ACIT'2002) / by Technology, International Arab Conference on Information . Publication: Duha,Qatar : Arab Conference on Information Technology, 2002 . 1059 P. Date: 2002 Availability: Items available: Library - Middle East University (2),

3. Proceedings of The 2003 International Arab Conference on Information Technology,December 20-23, 2003 Alexandria, Egypt / by Technology, International Arab Conference on Information . Publication: ِAlexandrea,Egypt : Arab Conference on Information Technology, 2003 . 460 P. Date: 2003 Availability: Items available: Library - Middle East University (2),

4. Sigcse Bulletin / by Boucher, Owens, Barbara . Publication: Austin,TX : ٍSt. Edward's University, 1991 . 392 P. Date: 1991 Availability: Items available: Library - Middle East University (1),

5. An enhanced resilient backpropagation artifical neural network for intrusion detection system / by al, zainab na'mh abdula . Publication: . 89 P. Availability: No items available:

6. Framework model for strategic planning using dynamic workflow / by al, zaid mohammad . Publication: . 86 P. Availability: No items available:

7. design and implementation of knowledge-based system for text retrieval based on context and user's prior knowledge / by alkubaisi, ghaith abdulsattar . Publication: . 88 P. Availability: No items available:

8. A Multi- Model Keystroke Dynamics Anomaly Detector for User Authentication / by Al, sajjad i . Publication: Amman : 2016 . 76 P. Date: 2016 Availability: No items available:

9. A New Audio Steganography Method Usin BI-LSB Embedding and Secret Message Integrity Validation / by Salih, Mahmood Maher . Publication: Amman : 2015 . 89 P. Date: 2015 Availability: No items available:

10. AContent- Based Brain tumor Images System for Classification, Retrieval and Diagnosis / by Hussein, Muhannad Hamad . Publication: Amman : 2016 . 143 P. Date: 2016 Availability: No items available:

11. A New Technique to Protect the Ownership of Images in Social Network using Encryption and Steganography Algorithms / by Khuffash, Imad Shafi . Publication: Amman : 2016 . 54 P. Date: 2016 Availability: No items available:

12. Secure Communication Based on Encryption and LSB Steganography Voice / by Allawi, Emad Tariq . Publication: Amman : 2015 . 75 P. Date: 2015 Availability: No items available:

13. Data Gathering Using Mobile Elements in Wireless Sensors Networks (WSNs) / by Al, Khaled Mohammad . Publication: Amman : 2016 . 71 P. Date: 2016 Availability: No items available:

14. Computer confluence : by Beekman, George. Publication: Upper Saddle River, N.J. : Pearson/Prentice Hall, 2005 . xxiii, 413 p. : 28 cm. Date: 2005 Availability: Items available: Library - Middle East University (9),