Follow
Prof.Tarig Mohamed Ahmed
Prof.Tarig Mohamed Ahmed
Information Technology Department- King abulaziz University
Verified email at uofk.edu
Title
Cited by
Cited by
Year
Developing prediction model of loan risk in banks using data mining
AJ Hamid, TM Ahmed
Machine Learning and Applications: An International Journal 3 (1), 1-9, 2016
1562016
Developing a predicted model for diabetes type 2 treatment plans by using data mining
TM Ahmed
Journal of Theoretical and Applied Information Technology 90 (2), 181, 2016
422016
Using data mining to develop model for classifying diabetic patient control level based on historical medical records
TM Ahmed
Journal of Theoretical and Applied Information Technology 87 (2), 316, 2016
342016
A Comparative Analysis of RAD and Agile Technique for Management of Computing Graduation Projects
* azal Qudus Khan1, Saim Rasheed1, Maged Alsheshtawi1, Tarig Mohamed Ahmed1 ...
Computers, Materials & Continua 2 (no.2), pp.777-796,, 2020
25*2020
Acceptance of e-government Services in Sudan: an Empirical Investigation
T Ahmed, N Alhadi, ME Seliaman
2015 International Conference on Cloud Computing (ICCC), 1-4, 2015
242015
Using secure-image mechanism to protect mobile agent against malicious hosts
TM Ahmed
International Journal of Computer and Information Engineering 3 (11), 2578-2583, 2009
182009
Using secure-image mechanism to protect mobile agent against malicious host
MA Tarig, M Ahmed
Proc. of World Academy and Science, Engineering and Technology, 439-444, 2009
132009
Comparative study of customer relationship management (CRM) and electronic customer relationship management (E-CRM).
AM Eltahir, TM Ahmed, H Ahmed, TA Abdalfadil
International Journal of Advanced and Applied Sciences 8 (7), 1-6, 2021
122021
Using TAM model to empirically examine students' attitudes towards e-services in college of business administration
S Bahaj, K Aljaaidi, T Ahmed
Management Science Letters 9 (5), 651-660, 2019
112019
Enhanced security of Rijndael algorithm using two secret keys
IMA Fadul, TMH Ahmed
International Journal of Security and its applications 7 (4), 127-134, 2013
112013
Using data mining in telecommunication industry: Customer's churn prediction model
R Masoud, TM Ahmed
Journal of Theoretical and Applied Information Technology 91 (2), 322, 2016
102016
Generating data warehouse schema
RA Ahmed, TM Ahmed
International Journal in Foundations of Computer Science & Technology …, 2014
92014
Developing technology acceptance model for e-service purposes
M Mohamed, T Ahmed
Management Science Letters 10 (10), 2221-2228, 2020
72020
Signing and verifying certificates by NTRU and RSA algorithms
MO Elbasheer, T Mohammed
2015 International Conference on Cloud Computing (ICCC), 1-4, 2015
72015
Increasing Mobile Agent Performance by Using Free Areas Mechanism.
TM Ahmed
J. Object Technol. 6 (4), 125-140, 2007
72007
Admitted Ocular Emergencies: A Four Year Review
A Iqbal, S Jan, MN Khan, S Khan, S Muhammad
Pakistan Journal of Ophthalmology 23 (2), 2007
62007
Generate Sub-Agent Mechanism to protect mobile agent privacy
AT Mohamed
2012 IEEE Symposium on Computers & Informatics (ISCI), 86-91, 2012
52012
Generating mobile agent securely by using MASL
TM Ahmed
25th IEEE International Conference on Distributed Computing Systems …, 2005
52005
A Comparative Analysis of Mobile Application Development Approaches: Mobile Application Development Approaches
MAMM Alsaid, TM Ahmed, S Jan, FQ Khan, AU Khattak
Proceedings of the Pakistan Academy of Sciences: A. Physical and …, 2021
42021
Text mining: A survey of Arabic root extraction algorithms
MAM Hamza, TM Ahmed, AMM Hilal
International Journal of Advanced and Applied Sciences 8 (1), 11-19, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20