Follow
Prof.Tarig Mohamed Ahmed
Prof.Tarig Mohamed Ahmed
Information Technology Department- King abulaziz University
Verified email at uofk.edu
Title
Cited by
Cited by
Year
Developing prediction model of loan risk in banks using data mining
AJ Hamid, TM Ahmed
Machine Learning and Applications: An International Journal 3 (1), 1-9, 2016
1152016
Developing a predicted model for diabetes type 2 treatment plans by using data mining
TM Ahmed
Journal of Theoretical and Applied Information Technology 90 (2), 181, 2016
322016
Using data mining to develop model for classifying diabetic patient control level based on historical medical records
TM Ahmed
Journal of Theoretical and Applied Information Technology 87 (2), 316, 2016
262016
Acceptance of e-government Services in Sudan: an Empirical Investigation
T Ahmed, N Alhadi, ME Seliaman
2015 International Conference on Cloud Computing (ICCC), 1-4, 2015
232015
Using secure-image mechanism to protect mobile agent against malicious host
MA Tarig, M Ahmed
Proc. of World Academy and Science, Engineering and Technology, 439-444, 2009
132009
A Comparative Analysis of RAD and Agile Technique for Management of Computing Graduation Projects
* azal Qudus Khan1, Saim Rasheed1, Maged Alsheshtawi1, Tarig Mohamed Ahmed1 ...
Computers, Materials & Continua 2 (no.2), pp.777-796,, 2020
12*2020
Generating data warehouse schema
RA Ahmed, TM Ahmed
International Journal in Foundations of Computer Science & Technology …, 2014
112014
Enhanced security of Rijndael algorithm using two secret keys
IMA Fadul, TMH Ahmed
International Journal of Security and its applications 7 (4), 127-134, 2013
92013
Developing technology acceptance model for e-service purposes
M Mohamed, T Ahmed
Management Science Letters 10 (10), 2221-2228, 2020
72020
Using TAM model to empirically examine students' attitudes towards e-services in college of business administration
S Bahaj, K Aljaaidi, T Ahmed
Management Science Letters 9 (5), 651-660, 2019
72019
Using data mining in telecommunication industry: Customer's churn prediction model
R Masoud, TM Ahmed
Journal of Theoretical and Applied Information Technology 91 (2), 322, 2016
72016
Admitted Ocular Emergencies: A Four Year Review
A Iqbal, S Jan, MN Khan, S Khan, S Muhammad
Pakistan Journal of Ophthalmology 23 (2), 2007
72007
Signing and verifying certificates by NTRU and RSA algorithms
MO Elbasheer, T Mohammed
2015 International Conference on Cloud Computing (ICCC), 1-4, 2015
62015
Increasing Mobile Agent Performance by Using Free Areas Mechanism.
TM Ahmed
J. Object Technol. 6 (4), 125-140, 2007
52007
Generate Sub-Agent Mechanism to protect mobile agent privacy
AT Mohamed
2012 IEEE Symposium on Computers & Informatics (ISCI), 86-91, 2012
42012
Generating mobile agent securely by using MASL
TM Ahmed
25th IEEE International Conference on Distributed Computing Systems …, 2005
42005
Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points
MF Anagreh, AM Hilal, TM Ahmed
International Journal of Advanced Computer Science and Applications 9 (1), 2018
22018
Developing an efficient model for building data warehouse using mobile agent
TM Ahmed, MH Fadhul
International Journal of Information Technology and Computer Science 9 (8), 9-16, 2016
22016
Protect Mobile Agent Against Malicious Host Using Partial-Mobility Mechanism'
TM Ahmed
International Journal in Foundations of Computer Science & Technology …, 2013
22013
Generate secure mobile agent by using sms to protect hosts
TM Ahmed
ACS/IEEE International Conference on Computer Systems and Applications …, 2010
22010
The system can't perform the operation now. Try again later.
Articles 1–20