Fadi Almasalha
Fadi Almasalha
Associate Professor of Computer Science, Applied Science Private University
Verifisert e-postadresse på asu.edu.jo
Sitert av
Sitert av
A students attendance system using QR code
F Masalha, N Hirzallah
International Journal of Advanced Computer Science and Applications 5 (3), 75-79, 2014
Data mining nursing care plans of end‐of‐life patients: A study to improve healthcare decision making
F Almasalha, D Xu, GM Keenan, A Khokhar, Y Yao, YC Chen, A Johnson, ...
International journal of nursing knowledge 24 (1), 15-24, 2013
Current state of pain care for hospitalized patients at end of life
Y Yao, G Keenan, F Al-Masalha, KD Lopez, A Khokar, A Johnson, ...
American Journal of Hospice and Palliative Medicine® 30 (2), 128-136, 2013
Pareto efficient multi-objective optimization for local tuning of analogy-based estimation
M Azzeh, AB Nassif, S Banitaan, F Almasalha
Neural Computing and Applications, 1-25, 2015
Secure multimedia transmission over RTP
F Almasalha, N Agarwal, A Khokhar
2008 Tenth IEEE International Symposium on Multimedia, 404-411, 2008
Comprehensive survey of the IoT open-source OSs
MH Qutqut, A Al-Sakran, F Almasalha, HS Hassanein
IET Wireless Sensor Systems 8 (6), 323-339, 2018
Software Testing Techniques in IoT
G Murad, A Badarneh, A Quscf, F Almasalha
2018 8th International Conference on Computer Science and Information …, 2018
Partial encryption of entropy-coded video compression using coupled chaotic maps
F Almasalha, R Hasimoto-Beltran, AA Khokhar
Entropy 16 (10), 5575-5600, 2014
Video security in Internet of things: an overview
MA Hamoudy, MH Qutqut, F Almasalha
IJCSNS 17 (8), 199, 2017
Semantic Computing
PCY Sheu, H Yu, CV Ramamoorthy, AK Joshi, LA Zadeh
John Wiley & Sons, 2011
Selective encryption based data security for Ogg streams
F Almasalha, A Khokhar, S Baqai
2010 IEEE International Conference on Acoustics, Speech and Signal …, 2010
Performance evaluation of chaotic and conventional encryption on portable and mobile platforms
R Hasimoto-Beltran, F Al-Masalha, A Khokhar
Chaos-Based Cryptography, 375-395, 2011
Scalable encryption of variable length coded video bit streams
F Almasalha, A Khokhar, R Hasimoto-Beltran
IEEE Local Computer Network Conference, 192-195, 2010
Performance evaluation of different encryption schemes on portable and mobile platforms
F Al-Masalha, R Hasimoto, A Khokhar
International Conference on Green Computing, 435-441, 2010
An overview of the Internet of things closed source operating systems
A Al-Sakran, MH Qutqut, F Almasalha, HS Hassanein, M Hijjawi
2018 14th International Wireless Communications & Mobile Computing …, 2018
A Survey of IoT Open Source Operating Systems
M Qutqut, A Alsakran, F Almasalha, H Hassanein
IET Wirel. Sens. Syst, 2018
Overview of the Current Status of NoSQL Database
FA Yasmin Rasheed, Mahmoud H. Qutqut
IJCSNS International Journal of Computer Science and Network Security 19 (4 …, 2019
Hybrid user action prediction system for automated home using association rules and ontology
A Shaban, F Almasalha, MH Qutqut
IET Wireless Sensor Systems 9 (2), 85-93, 2019
Secure transmission of multimedia contents over low-power mobile devices
F Almasalha, F Naït-Abdesselam, G Trajcevski, A Khokhar
Journal of information security and applications 40, 183-192, 2018
A New Steganography Technique using JPEG Images
RA Watheq, F Almasalha, MH Qutqut
Systemet kan ikke utføre handlingen. Prøv igjen senere.
Artikler 1–20