Developing prediction model of loan risk in banks using data mining AJ Hamid, TM Ahmed Machine Learning and Applications: An International Journal 3 (1), 1-9, 2016 | 115 | 2016 |
Developing a predicted model for diabetes type 2 treatment plans by using data mining TM Ahmed Journal of Theoretical and Applied Information Technology 90 (2), 181, 2016 | 32 | 2016 |
Using data mining to develop model for classifying diabetic patient control level based on historical medical records TM Ahmed Journal of Theoretical and Applied Information Technology 87 (2), 316, 2016 | 26 | 2016 |
Acceptance of e-government Services in Sudan: an Empirical Investigation T Ahmed, N Alhadi, ME Seliaman 2015 International Conference on Cloud Computing (ICCC), 1-4, 2015 | 23 | 2015 |
Using secure-image mechanism to protect mobile agent against malicious host MA Tarig, M Ahmed Proc. of World Academy and Science, Engineering and Technology, 439-444, 2009 | 13 | 2009 |
A Comparative Analysis of RAD and Agile Technique for Management of Computing Graduation Projects * azal Qudus Khan1, Saim Rasheed1, Maged Alsheshtawi1, Tarig Mohamed Ahmed1 ... Computers, Materials & Continua 2 (no.2), pp.777-796,, 2020 | 12* | 2020 |
Generating data warehouse schema RA Ahmed, TM Ahmed International Journal in Foundations of Computer Science & Technology …, 2014 | 11 | 2014 |
Enhanced security of Rijndael algorithm using two secret keys IMA Fadul, TMH Ahmed International Journal of Security and its applications 7 (4), 127-134, 2013 | 9 | 2013 |
Developing technology acceptance model for e-service purposes M Mohamed, T Ahmed Management Science Letters 10 (10), 2221-2228, 2020 | 7 | 2020 |
Using TAM model to empirically examine students' attitudes towards e-services in college of business administration S Bahaj, K Aljaaidi, T Ahmed Management Science Letters 9 (5), 651-660, 2019 | 7 | 2019 |
Using data mining in telecommunication industry: Customer's churn prediction model R Masoud, TM Ahmed Journal of Theoretical and Applied Information Technology 91 (2), 322, 2016 | 7 | 2016 |
Admitted Ocular Emergencies: A Four Year Review A Iqbal, S Jan, MN Khan, S Khan, S Muhammad Pakistan Journal of Ophthalmology 23 (2), 2007 | 7 | 2007 |
Signing and verifying certificates by NTRU and RSA algorithms MO Elbasheer, T Mohammed 2015 International Conference on Cloud Computing (ICCC), 1-4, 2015 | 6 | 2015 |
Increasing Mobile Agent Performance by Using Free Areas Mechanism. TM Ahmed J. Object Technol. 6 (4), 125-140, 2007 | 5 | 2007 |
Generate Sub-Agent Mechanism to protect mobile agent privacy AT Mohamed 2012 IEEE Symposium on Computers & Informatics (ISCI), 86-91, 2012 | 4 | 2012 |
Generating mobile agent securely by using MASL TM Ahmed 25th IEEE International Conference on Distributed Computing Systems …, 2005 | 4 | 2005 |
Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points MF Anagreh, AM Hilal, TM Ahmed International Journal of Advanced Computer Science and Applications 9 (1), 2018 | 2 | 2018 |
Developing an efficient model for building data warehouse using mobile agent TM Ahmed, MH Fadhul International Journal of Information Technology and Computer Science 9 (8), 9-16, 2016 | 2 | 2016 |
Protect Mobile Agent Against Malicious Host Using Partial-Mobility Mechanism' TM Ahmed International Journal in Foundations of Computer Science & Technology …, 2013 | 2 | 2013 |
Generate secure mobile agent by using sms to protect hosts TM Ahmed ACS/IEEE International Conference on Computer Systems and Applications …, 2010 | 2 | 2010 |