Aladdin Ayesh
TitleCited byYear
Phishing detection based associative classification data mining
N Abdelhamid, A Ayesh, F Thabtah
Expert Systems with Applications 41 (13), 5948-5959, 2014
1902014
Access network selection based on fuzzy logic and genetic algorithms
M Alkhawlani, A Ayesh
Advances in Artificial Intelligence 8 (1), 1, 2008
932008
Image Enhancement Using Particle Swarm Optimization.
M Braik, AF Sheta, A Ayesh
World congress on engineering 1, 978-988, 2007
792007
Development of software effort and schedule estimation models using soft computing techniques
A Sheta, D Rine, A Ayesh
2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on …, 2008
622008
Business intelligence and performance management: theory, systems and industrial applications
P Rausch, AF Sheta, A Ayesh
Springer Science & Business Media, 2013
562013
MAC: A multiclass associative classification algorithm
N Abdelhamid, A Ayesh, F Thabtah, S Ahmadi, W Hadi
Journal of Information & Knowledge Management 11 (02), 1250011, 2012
532012
Analytical study to detect threshold number of efficient routes in multipath AODV extensions
A Zahary, A Ayesh
2007 International Conference on Computer Engineering & Systems, 95-100, 2007
402007
Associative classification approaches: review and comparison
N Abdelhamid, F Thabtah
Journal of Information & Knowledge Management 13 (03), 1450027, 2014
392014
Emotionally motivated reinforcement learning based controller
A Ayesh
2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat …, 2004
342004
Intelligent intrusion detection systems using artificial neural networks
A Shenfield, D Day, A Ayesh
ICT Express 4 (2), 95-99, 2018
302018
Particle swarm optimisation enhancement approach for improving image quality
M Braik, A Sheta, A Ayesh
International Journal of Innovative Computing and Applications 1 (2), 138, 2007
272007
Optimizing the communication distance of an ad hoc wireless sensor networks by genetic algorithms
M Al-Obaidy, A Ayesh, AF Sheta
Artificial Intelligence Review 29 (3-4), 183, 2008
262008
Using self organizing map to cluster arabic crime documents
M Alruily, A Ayesh, A Al-Marghilani
Proceedings of the international multiconference on computer science and …, 2010
222010
Identification of a chemical process reactor using soft computing techniques
H Al-Hiary, M Braik, A Sheta, A Ayesh
2008 IEEE International Conference on Fuzzy Systems (IEEE World Congress on …, 2008
222008
Access network selection using combined fuzzy control and MCDM in heterogeneous networks
MM Alkhwlani, A Ayesh
2007 International Conference on Computer Engineering & Systems, 108-113, 2007
222007
Perception and emotion based reasoning: A connectionist approach
A Ayesh
Informatica (Slovenia) 27 (2), 119-126, 2003
222003
Detection of bacteria causing eye infection using a neural network based electronic nose system
P Boilot, EL Hines, S John, J Mitchell, F Lopez, JW Gardner, E Llobet, ...
212000
A triliteral word roots extraction using neural network for Arabic
H Al-Serhan, A Ayesh
2006 International Conference on Computer Engineering and Systems, 436-440, 2006
202006
Crime profiling for the Arabic language using computational linguistic techniques
M Alruily, A Ayesh, H Zedan
Information Processing & Management 50 (2), 315-341, 2014
192014
Towards agent-based agile approach for game development methodology
R Al-Azawi, A Ayesh, MA Obaidy
2014 World Congress on Computer Applications and Information Systems (WCCAIS …, 2014
182014
The system can't perform the operation now. Try again later.
Articles 1–20