Abd Samad Hasan Basari
Title
Cited by
Cited by
Year
Opinion mining of movie review using hybrid method of support vector machine and particle swarm optimization
ASH Basari, H Burairah, G Pramudya, J Zeniarja
2192012
Ehrs acceptance in Jordan hospitals by Utaut2 Model: preliminary result
MB Alazzam, AS Sibghatullah, M Doheir, OMA Enaizan, AHK Mamra
Journal of Theoretical and Applied Information Technology 78 (3), 473, 2015
462015
A new image encryption approach using the integration of a shifting technique and the AES algorithm
A Bashir, ASB Hasan, H Almangush
Int J Comput Appl 975, 8887, 2012
332012
PILOT STUDY OF EHRS ACCEPTANCE IN JORDANHOSPITALS BY UTAUT2.
MB Alazzam, ABD BASARI, AS SIBGHATULLAH, MR RAMLI, MM JABER, ...
Journal of Theoretical & Applied Information Technology 85 (3), 2016
292016
Exam timetabling using graph colouring approach
B Hussin, AS Shibghatullah, SA Asmai, NS Othman
2011 ieee conference on open systems, 133-138, 2011
292011
Correlated node behavior model based on semi Markov process for MANETS
AH Azni, R Ahmad, ZAM Noh, ASH Basari, B Hussin
arXiv preprint arXiv:1203.4319, 2012
282012
Modification of Dijkstra’s algorithm for safest and shortest path during emergency evacuation
K Samah, B Hussin, ASH Basari
Applied Mathematical Sciences 9 (31), 1531-1541, 2015
212015
Building maintenance management preliminary finding of a case study in Icym
Y Ab Wahab, ASH Basari, A Samad
Middle-East Journal of Science Research, 1260-1268, 2013
212013
Trust in stored data in EHRs acceptance of medical staff: using UTAUT2
MB Alazzam, ASH Basari, AS Sibghatullah, YM Ibrahim, MR Ramli, ...
International Journal of Applied Engineering Research 11 (4), 2737-2748, 2016
202016
Banknote authentication using artificial neural network
NS Mohamad, B Hussin, AS Shibghatullah, ASH Basari
International Symposium on Research in Innovation and Sustainability 26 (5 …, 2014
172014
A new image encryption approach using block-based on shifted algorithm
AB Abugharsa, ASH Basari, H Almangush
International Journal of Computer Science and Network Security (IJCSNS) 11 …, 2011
172011
A Novel Image Encryption using an Integration Technique of Blocks Rotation based on the Magic cube and the AES Algorithm
AB Abugharsa, ASBH Basari, H Almangush
arXiv preprint arXiv:1209.4777, 2012
152012
Structural design of secure transmission module for protecting patient data in cloud-based healthcare environment
M Doheir, B Hussin, A Samad, H Basari, MB Alazzam
Middle-East J. Sci. Res 23 (12), 2961-2967, 2015
132015
Classification of Critical Cloud Computing Security Issues for Banking Organizations: A Cloud Delphi Study
A Elzamly, B Hussin
International Journal of Grid and Distributed Computing 9 (8), 137-158, 2016
112016
Physicians’ acceptance of electronic health records exchange: An extension of the with UTAUT2 model institutional trust
MB Alazzam, H Basari, ABD Samad, AS Sibghatullah, M Doheir, ...
Advanced Science Letters 21 (10), 3248-3252, 2015
112015
Simulation method of shortest and safest path algorithm for evacuation in high rise building
NAM Sabri, ASH Basari, B Husin, K Samah
Applied Mathematical Sciences 8 (104), 5163-5172, 2014
112014
AN UNDERSTANDING AND APPROACH SOLUTION FOR COLD START PROBLEM ASSOCIATED WITH RECOMMENDER SYSTEM: A LITERATURE REVIEW.
N SURYANA, H BASARI, ABDS BIN
Journal of Theoretical & Applied Information Technology 96 (9), 2018
102018
Neural network prognostics model for industrial equipment maintenance
SA Asmai, ASH Basari, AS Shibghatullah, NK Ibrahim, B Hussin
2011 11th International Conference on Hybrid Intelligent Systems (HIS), 635-640, 2011
102011
DIGITAL HADITH AUTHENTICATION: A LITERATURE REVIEW AND ANALYSIS.
ET Luthfi, N Suryana, AH Basari
Journal of Theoretical & Applied Information Technology 96 (15), 2018
92018
Epidermic modelling for correlated node behavior in ad hoc networks
AH Azni, R Ahmad, ZAM Noh, ASH Basari, B Hussin
International Journal of Chaotic Computing 1 (1), 22-30, 2013
92013
The system can't perform the operation now. Try again later.
Articles 1–20