default search action
Emad Eddien Abdallah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j22]Alaa Eddien Abdallah, Ebaa Fayyoumi, Emad E. Abdallah, Ahmad Qawasmeh, Islam T. Almalkawi:
Spherical-based routing protocols for three-dimensional MANET. Int. J. Comput. Sci. Math. 16(2): 125-135 (2022) - 2021
- [j21]Islam T. Almalkawi, Jafar Raed, Ayoub Alsarhan, Alaa Eddien Abdallah, Emad E. Abdallah:
A Novel and Efficient Priority-Based Cross-Layer Contextual Unobservability Scheme Against Global Attacks for WMSNs. Int. J. Interact. Mob. Technol. 15(3): 43-69 (2021) - 2020
- [j20]Yasser Qawasmeh, Sari Awwad, Ahmed Fawzi Otoom, Feras Hanandeh, Emad Eddien Abdallah:
Local patterns for offline Arabic handwritten recognition. Int. J. Adv. Intell. Paradigms 16(2): 203-215 (2020) - 2019
- [j19]Ahmed Fawzi Otoom, Doaa Al-Shdaifat, Maen Hammad, Emad E. Abdallah, Ashraf Hamdan Aljammal:
Automated labelling and severity prediction of software bug reports. Int. J. Comput. Sci. Eng. 19(3): 334-342 (2019) - 2017
- [j18]Ayoub Alsarhan, Emad Eddien Abdallah, Ashraf Hamdan Aljammal:
Competitive Processors Allocation in 2D Mesh Connected Multicomputer Networks: A Dynamic Game Approach. Int. J. Grid High Perform. Comput. 9(2): 53-69 (2017) - 2016
- [j17]Alaa Eddien Abdallah, Emad E. Abdallah, Mohammad Bsoul, Ahmed Fawzi Otoom:
Randomized geographic-based routing with nearly guaranteed delivery for three-dimensional ad hoc network. Int. J. Distributed Sens. Networks 12(10) (2016) - [j16]Nedal Tahat, Emad E. Abdallah:
A proxy partially blind signature approach using elliptic curve cryptosystem. Int. J. Math. Oper. Res. 8(1): 87-95 (2016) - 2015
- [j15]Alaa Eddien Abdallah, Emad Eddien Abdallah, Mohammad Bsoul, Ahmad Al-Khasawneh, Lina Amer:
A blind 3D watermarking technique using spherical coordinates and skewness measure. Int. J. Secur. Networks 10(1): 1-8 (2015) - [j14]Mohammad Bsoul, Yousef Kilani, Maen Hammad, Emad E. Abdallah, Ayoub Alsarhan:
An Index-Based Approach for Wireless Sensor Networks. Wirel. Pers. Commun. 82(4): 2185-2197 (2015) - 2014
- [j13]Ahmed Fawzi Otoom, Emad E. Abdallah, Maen Hammad, Mohammad Bsoul, Alaa Eddien Abdallah:
An intelligent system for author attribution based on a hybrid feature set. Int. J. Adv. Intell. Paradigms 6(4): 328-345 (2014) - [j12]Emad Eddien Abdallah, Ibrahim Al-Oqily, Alaa Eddien Abdallah, Ahmed Fawzi Otoom, Ayoub Alsarhan:
Spectral Graph and Minimal Spanning Tree for 3D Polygonal Meshes Fingerprinting. Int. J. Inf. Technol. Web Eng. 9(4): 40-53 (2014) - [j11]Alaa Eddien Abdallah, Mohammad Bsoul, Emad Eddien Abdallah, Ibrahim Al-Oqily, George Kao:
Cluster-Based Online Routing Protocols for Ad Hoc Network. Int. J. Inf. Technol. Web Eng. 9(4): 54-66 (2014) - 2013
- [j10]Essam Al-Daoud, Feras Hanandeh, Emad E. Abdallah, Alaa Eddien Abdallah:
Texture recognition by using a non-linear kernel. Int. J. Comput. Appl. Technol. 48(3): 235-240 (2013) - [j9]Emad Eddien Abdallah, Alaa Eddien Abdallah, Ahmad Al-Khasawneh, Mohammad Bsoul, Ayoub Alsarhan:
Secure local algorithm for establishing a virtual backbone in 3D ad hoc network. Int. J. Netw. Virtual Organisations 12(1): 70-83 (2013) - [j8]Emad Eddien Abdallah, Alaa Eddien Abdallah, Mohammad Bsoul, Ahmed F. Otoom, Essam Al-Daoud:
Simplified features for email authorship identification. Int. J. Secur. Networks 8(2): 72-81 (2013) - [j7]Ayoub Alsarhan, Emad E. Abdallah, Ibrahim Al-Oqily, Alaa Eddien Abdallah:
An Economic Model for Resource Adaptation in 2D Mesh Multicomputer Networks. Int. J. Comput. Their Appl. 20(1): 46-53 (2013) - [j6]Mohammad Bsoul, Ahmad Al-Khasawneh, Alaa Eddien Abdallah, Emad Eddien Abdallah, Ibrahim Obeidat:
An Energy-Efficient Threshold-Based Clustering Protocol for Wireless Sensor Networks. Wirel. Pers. Commun. 70(1): 99-112 (2013) - 2012
- [j5]Feras Hanandeh, Emad E. Abdallah, Sahar Idwan, Izzat Alsmadi:
Checking the efficiency of integrity tests in distributed and parallel database. Int. J. Bus. Inf. Syst. 11(2): 235-252 (2012) - 2011
- [j4]Mohammad Bsoul, Ahmad Al-Khasawneh, Emad Eddien Abdallah, Yousef Kilani:
Enhanced Fast Spread Replication strategy for Data Grid. J. Netw. Comput. Appl. 34(2): 575-580 (2011) - 2010
- [j3]Emad E. Abdallah, A. Ben Hamza, Prabir Bhattacharya:
Video watermarking using wavelet transform and tensor algebra. Signal Image Video Process. 4(2): 233-245 (2010) - 2009
- [j2]Emad E. Abdallah, A. Ben Hamza, Prabir Bhattacharya:
Watermarking 3D models using spectral mesh compression. Signal Image Video Process. 3(4): 375-389 (2009) - 2007
- [j1]Emad E. Abdallah, A. Ben Hamza, Prabir Bhattacharya:
Improved image watermarking scheme using fast Hadamard and discrete wavelet transforms. J. Electronic Imaging 16(3): 033020 (2007)
Conference and Workshop Papers
- 2023
- [c10]Ahmed Fawzi Otoom, Wafa' Eleisah, Emad E. Abdallah:
Deep Learning for Accurate Detection of Brute Force attacks on IoT Networks. ANT/EDI40 2023: 291-298 - [c9]Emad E. Abdallah, Ahmad Aloqaily, Hiba Fayez:
Identifying Intrusion Attempts on Connected and Autonomous Vehicles: A Survey. ANT/EDI40 2023: 307-314 - [c8]Alaa Eddien Abdallah, Emad E. Abdallah:
A Survey on Geographical Based Topology Control for Ad Hoc Networks. ANT/EDI40 2023: 429-435 - 2022
- [c7]Emad E. Abdallah, Wafa' Eleisah, Ahmed Fawzi Otoom:
Intrusion Detection Systems using Supervised Machine Learning Techniques: A survey. ANT/EDI40 2022: 205-212 - 2020
- [c6]Emad E. Abdallah, Jamil R. Alzghoul, Muath Alzghool:
Age and Gender prediction in Open Domain Text. ANT/EDI40 2020: 563-570 - 2016
- [c5]Emad E. Abdallah, Ebaa Fayyoumi:
Assistive Technology for Deaf People Based on Android Platform. FNC/MobiSPC 2016: 295-301 - 2008
- [c4]Emad E. Abdallah, A. Ben Hamza, Prabir Bhattacharya:
Robust 3D Watermarking Technique Using Eigendecomposition and Nonnegative Matrix Factorization. ICIAR 2008: 253-262 - 2007
- [c3]Emad E. Abdallah, A. Ben Hamza, Prabir Bhattacharya:
Spectral graph-theoretic approach to 3D mesh watermarking. Graphics Interface 2007: 327-334 - [c2]Emad E. Abdallah, A. Ben Hamza, Prabir Bhattacharya:
MPEG Video Watermarking Using Tensor Singular Value Decomposition. ICIAR 2007: 772-783 - 2006
- [c1]Emad E. Abdallah, A. Ben Hamza, Prabir Bhattacharya:
A robust block-based image watermarking scheme using fast Hadamard transform and singular value decomposition. ICPR (3) 2006: 673-676
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint