Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Khaldoun Batiha"'
Recently, there are several studies have proposed user authentication frameworks to defend against different types of attacks such as phishing, replay attack, man in the middle attack and denial of service attack, etc. Most of these frameworks consis
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cb8f080c7a8cb89baceec1c2bf2dcd6f
Publikováno v:
Transactions on Emerging Telecommunications Technologies. 31
Autor:
Khaled Batiha, Khaldoun Batiha
Publikováno v:
Research Journal of Applied Sciences, Engineering and Technology. 12:638-641
The major objective of this study is to obtain mathematical models for evaluation behavior of non-linear system, parameters non-linear elements are taken to be time change. The problem is solved by transaction from description at non-linear non-stati
Autor:
Suli Wang, Khaldoun Batiha
Publikováno v:
International Journal of Communication Systems. 33:e4458
Publikováno v:
Government Information Quarterly. 30:277-288
User satisfaction is a crucial factor for continual usage of e-Government services and for the success or failure of e-Government projects. The main challenge for Jordanians is what are the key determinants of their satisfaction? This paper aims to i
Autor:
Khaldoun Batiha
Publikováno v:
International journal of Computer Networks & Communications. 5:41-51
IPv6 protocol is the next candidate protocol after IPv4 protocolthat used for a long time. For this protocol the addressing types and address size are discussed to list some modifications that could improve its performance through the internet. At th
Approximate analytical solution for the Zakharov–Kuznetsov equations with fully nonlinear dispersion
Autor:
Khaldoun Batiha
Publikováno v:
Journal of Computational and Applied Mathematics. 216:157-163
In this paper, variational iteration method (VIM) is used to obtain numerical and analytical solutions for the Zakharov–Kuznetsov equations with fully nonlinear dispersion. Comparisons with exact solution show that the VIM is a powerful method for
Autor:
Khaldoun Batiha, Hasan Al-Refai
Publikováno v:
Journal of Advanced Computer Science & Technology. 6:13
Lots of work have been attempted to enhance the SET protocol performance special attention is on E-payment phase. This paper thoroughly analyzes recent works on payment phase; it has been found that this subject requires considerable enhancements, si
Autor:
Khaldoun Batiha
Publikováno v:
Journal of Advanced Computer Science & Technology. 6:1
As the developing use of web and intranet keep on expanding colossally, the issue to suit more clients and gadgets has been risen. Subsequently, a location range must be required to oblige the hurry. Sadly, IPv4 address region and alternatives are in
Autor:
Khaldoun Batiha
Publikováno v:
Journal of Advanced Computer Science & Technology. 3
IPv4 protocol is now no more sufficient due to its limited address space where this protocol uses only 32-bit for addressing. IPv6 protocol is the next protocol which was introduced as a new protocol that provide a huge address space .In This paper w