Monday, February 1, 2021

ublication & Conferences An agent-based framework for providing security in a cloud-based E-learning System , International Journal of Advanced and Applied Sciences,  Volume 7, Issue 7 , Pages: 19-24, 7-May-2020 //ISI, https://doi.org/10.21833/ijaas.2020.07.003 An Automated Web-Based System for Follow up on the Scholarships of Faculty Members: A Case Study Based on Shaqra University, IJCSNS International Journal of Computer Science and Network Security, VOL.19 No.10, October 2019 //ISI http://paper.ijcsns.org/07_book/201910/20191007.pdf E- Learning Based on Cloud Computing Technology, International Conference on Computer Applications & Information Security 2018 - Network Applications and Convergence of IT and Telecom Networks, National Computer, Date of Conference: 4-6 April 2018 is technically co-sponsored by IEEE Saudi Section      https://ieeexplore.ieee.org/document/8441968 Sprint Backlog Estimating and Planning Using Planning Poker Technique in Agile Scrum Framework, International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X -Volume-8, Issue-5, (May 2018)        https://www.ijarcsse.com/index.php/ijarcsse/article/view/686. Strategy and Implementation of Web Mining Tools, International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 12, Volume 4 (December 2017)       http://www.ijirae.com/volume-4-issue-12. Special Criteria of the Quality of Web Sites(Access ,Design, ease of use and Content ) applied to Sudanese Government Web Sites , Al Neelain University Scientific Journal, Khartoum – Sudan (March 2015) Electronic Accounting Applications using Cloud Computing technology, Journal of Information Sciences and Computing Technologies (JISCT) ISSN: 2394-9066 www.scitecresearch.com/journals/index.php/jisct Volume 4, Issue 2, July 07, 2015 Evaluation of Sudanese Web Sites. (Governmental, Educational, and Commercial) 5th Annual Conference of the Graduate College – Al Neelain University, Khartoum – Sudan (Jan. 2014) Under Publication: Vulnerabilities, Threats, and Challenges on Cyber Security and the Internet of Things: A Comprehensive Study), Accepted / under publication in IJCSNS International Journal of Computer Science and Network Security A novel Methodology for Improving Information Security In Images Using Textural Features, Accepted / under publication in INASS International Journal of Intelligent Engineering and Systems