Faculty of Information Technology

ImageThesis TitleResearcherDate Of PublicationThesis Link
User Authentication Based on Statistical Mouse Dynamics BiometricsYousef Abdelrahman Abdelaziz Abudayeh2020

Download

A COMPARATIVE STUDY OF TWO OBJECTIVE FUNCTIONSMOHMMAD SALAH AL-ESWID2020

Download

Efficient Graph-Based Image Segmentation for Natural ImagesLaila Khalil Almugheer2017

Download

ANN and DNN-based Models for DDoS Detection via Network Traffic ForecastingAmjad Ibrahim Gendary2019

Download

Tuning Approach to Improve Multilayer Perceptron for Breast Cancer PredictionFidaa Mousa Ahmad Al-Shami2019

Download

Automated Arabic Essay Grading System based on Support Vector Machine and Text Similarity AlgorithmSaeda Esmaile Odeh al-awaida2019

Download

Strengthening the MD5 File Integrity Algorithm with User FingerprintMarwa Hussein Issa Al-Awawdeh2019

Download

Image Analysis for Mandible Bone Properties on Cone-Beam CT to Detect OsteoporosisRasha Abu Marar2019

Download

PIN Authentication Using Multi-Model Anomaly Detection in Keystroke Dynamics on Mobile DevicesGhofran mahmood khalaf2019

Download

Improving AES Algorithm using Multiple Secret KeysSuhair haseeb al waith2019

Download

Steganalysis of Color Images for Low Payload DetectionRenad mekhled al manaseer2019

Download

Imperceptibility and Robustness Improvement using segmented DWT Watermarking TechniqueSura abdulmunem M. al-juboori2019

Download

Article Reformatting Algorithm for Multiple Journal TemplateSayel mohammad ali fayyad2019

Download

Enhancement of Digital Signature SchemeRuqa Abdulkareem Salih Al-Shnawa2018

Download

Implementation of proposed lightweight cryptosystem for use in Cloud Computing SecurityLubna Mutasem Al-Ramini2018

Download

Optimizing Indoor Tracking System for Wireless Sensor Networks Using ZigBeeAhmad H. Mahafzah2018

Download

Comparative study for Order Preserving Encryption CharacteristicAnas Abdulrazzaq Ali Aljuboori2018

Download

An anomaly detection model for signature authentication on mobile devicesShawq Salman Mahmood Al-Khafaji2018

Download

Image classification based on enhancement of local binary patternAhmad A Suleiman2018

Download

Finding Cliques In Simulated Social Networks Using Graph Coloring TechniqueMohammad Hussein Alomari2017

Download

Building Ontology-based Metadata to Support Arabic Quality Assurance DocumentationFaisal Mohamed Alromaihi2017

Download

Multiple Pseudo Random Number Generators Implementation for Watermarking TechniqueAysar Shamil Alsaadi2017

Download

A Signcryption Approach Based on Rabin Digital Signature SchemesAli Mohammad Alzeinat2017

Download

Computation Complexity Improvement for Digital Signature AlgorithmMohammed Mustafa Rifaat2017

Download

Security Enhancement of Image Steganography Using Embedded Integrity FeaturesZinah Talaat Rashid AL-Windawi2017

Download

The Detection of Data Hiding in RGB Images Using Statistical SteganalysisZaid Ibrahim Rasool Rasool2017

Download

An Improved Text Watermarking Algorithm for Color ImagesAkram Naser Al-Dakari2017

Download

Adoption Conceptual Framework based on Agility and Flexibility in Cloud Computing SystemMustafa Awad Farhan / Hesham Abusaimeh2017

Download

Performance Analysis for Hashing Over Encrypted Data TechniquesEsraa Sameer Al-Rawashdeh2016

Download

Statistical Steganalysis Detector Model for 8-bit Depth ImagesZaid Hadi Al-Taie - - Mudhafar Al-Jarrah2016

Download

Measuring the Quality of Online Learning Material Using Semantic Similarity MeasuresEman N. Aloraini - Ahmad Kayed2016

Download

Statistical Arabic Grammar Analyzer Based on Rules Mining Approach Using Naïve Bayesian AlgorithmAhmad Wasef Alfares - Ahmad Adel Abu-Shareha2016

Download

Modified Random Early Detection (RED) Technique Using Various Congestion IndicatorsMohammad Ramez Abbas Ali - Ahmad Adel Abu-Shareha2016

Download

Accuracy Evaluation of Brain Tumor Detection using Entropy-based Image ThresholdingAmal.Q. Alyahya - Ahmad Adel Abu-Shareha2017

Download

Enhanced Distributed Defense Mechanism Against Volumetric DDoS AttacksEmad Bani Melhem - Maamoun Ahmed2016

Download

Offline Arabic Handwritten Isolated Character Recognition System Using Support vector Machine and Neural NetworkMohamed Anas Hussein Al-Jubouri - Hesham Abusaimeh2016

Download

The Semantic Similarity Measures Using Arabic OntologyMohammad Ghandi Aldiery - - Ahmad K. A. Kayed2016

Download

Detecting Phishing Emails Using Machine Learning TechniquesSa’id Abdullah Al-Saaidah - Oleg Viktorov2016

Download

A New Technique to Protect the Ownership of Images in Social Network using Encryption and Steganography AlgorithmsImad Shafi Khuffash2016

Download

A Hybrid Approach for Web Change DetectionSakher Khaleel Al-Qaaideh2009

Download

GPS – MCRM INTEGRATION SOLUTIONMaram Ayoub Da’ana - Professor Mohammad A. Al‐Fayoumi2009

Download

Secure Authentication Protocol and Key Agreement for Mobile Networks Using Public-Key CryptographyHaneen Mohammed Al-Fayoumi - Prof. Nidal Shilbayeh2011

Download

A Decision Support System for E-banking Adoption in Jordan: A Critical Success Factors PerspectiveMohammed AbdulKareem Abukhadegeh - Dr. Mohammad Al – Fayoumi2008

Download

A Secure Home Appliances Remote Control ModelMohammed Mohammed Jasim - Dr. Oleg Viktorov2014

Download

Image Steganography Technique Based on Predetermined Pattern and Histogram AnalysisHaya Mohammad Al Haj - Dr. Mohammed A. Fadhil Al Husainy2015

Download

Hiding Secret Images within RGB Images Using an Enhanced LSB MethodMohamed Zeyad Alhaj Qasem - Dr. Mudhafar Al-Jarrah2014

Download

A Model for Cognitive Map Construction Using Spatial Information Indoor EnvironmentMustafa Abdul-Baqi Raheem Al-Towaijary - Dr. Hussein H. Owaied2014

Download

Design of Anti Money Laundering Framework for JordanKamel A.A.AL-Mahameed - Professor Mohammad A. Al-Fayoumi2009

Download

Integrating Internet of Things and Wireless Sensor Networks for Metropolitan Explosive DetectionZahraa Abdul Hussein Jaaz - Dr. Maamoun Khaled Ahmed2014

Download

Enhanced Solutions for Misuse Network Intrusion Detection System using SGA and SSGASabah Abdulazeez Jebur - Dr. Hebah H. O. Nasereddin2015

Download

Framework Model of Integration xRM with GISMOHAMMAD MAHMOUD SALEH ASRAWI - Dr. HAZIM FARHAN2011

Download

A Framework Model for Arabic Handwritten Text Recognition to Handle Missing Text FragmentsBaha Abd Al-wahhab Al-Garalleh-Dr. Hussein Hadi Owaied2013

Download

Evaluating Semantic Measures by Computing the Coverage of a Condensed TextZainab Mahmoud Bayram - Ahmad K. A. Kayed2016

Download

Task Scheduling Using Best-Level-Job-First on Private Cloud ComputingMohammed Ibrahim Aridah- Dr. Mohammed A. F. Al -Husainy2016

Download

A Method for Static Video Summarization for Reducing Power Consumption and Its Impact on BandwidthMohammed Hamid Al-Kubaisi-Dr. Mohammed A. F. Al-Husainy2016

Download

Image Encryption System by Generating Chains from the Secret KeyMay Fawaz Al -Jabali - Dr. Mohammed A. F. Al Husainy2016

Download

Performance Analysis for Fully and Partially Homomorphic Encryption TechniquesRaya A. Al-Shibib - Ahmad Kayed2016

Download

A Comparative Study of Classification Techniques for English to Arabic Speech Recognitionayoub abdelrahman al-omari -hebah nasereddin2016

Download

A New Statistical Anomaly Detector Model for Keystroke Dynamics on Touch Mobile DevicesNoor Mahmood Shakir Al-Obaidi - Mudhafar Al-Jarrah2016

Download

The Hiding of Multimedia Secret Files in Dual RGB Cover Images Using LSB Steganography TechniquesMarwa Tariq Ahmed Al-Bayati - Mudhafar Al-Jarrah2016

Download

Developing Parallel Technique for the Internet of Things Devices by using local Map Reduce at the sink node.Muna George Oweis - Sadeq AlHamouz2016

Download

Analytical Study for the Mutable Order-Preserving Encoding with Periodically Encryption Key ChangingSuha Wasof Omar -Ahmad Al- Kayed2016

Download

Voice Encryption Using Twin Stream Cipher AlgorithmOmar Mejbel Hammad Aljouani-Dr. Hebah H. O. Nasereddin2016

Download

Performance Evaluation of Similarity Functions for Duplicate Record DetectionMethaq Kadhum Alnoory2011

Download

Proposed Model For Software Configuration Management Theoretical ToolYousef Salman Al-Shaikhly - Prof. Mohammad Al-Haj Hassan2011

Download

Performance Evaluation of Blocking Methods for Duplicate Record DetectionRaed Mahmmod Al Dummor -Prof. Musbah M. Aqel2010

Download

Towards Achieving, Self-Load Balancing In Autonomic Overlay NetworksMwafaq Salim Al-Zboon - Dr. Hussein H. Owaied2012

Download

Precluding Software Piracy Using Asymmetric CryptographyZeana Sattar Jabbar - Professor Mohammad A. Al-Fayoumi2009

Download

CFD_Mine: Discovery of Conditional Functional Dependencies in Relational Databases.Mohammed Raghep Mohammed Hakawati2009

Download

A New Secure Architecture for Trust and Privacy on Social Network SitesMohmmad Hamed Allymoun2011

Download

A Comparative Study of Indexing Techniques for Relational Database Management SystemsHuda Ayesh Mashaan Alrashidi - Dr.Hazim A. Farhan2011

Download

The Effectiveness of Haar Features and Threshold in Multiple Face Detection Systems Based on Adaboost AlgorithmKhadija Mustafa Khalil Al-Noori- Prof. Nidal .F Shilbayeh2011

Download

Mobile Trade Agent SecurityShaima Hameed Al-Khalifa2011

Download

Investigation on Order-Preserving Encryption for Database in Cloud ComputingAmro Akram Bazoon-Prof. Ahmad K. A. Kayed2016

Download

Applying the Kinect Device for Human Identification System in the ATM EnvironmentAliAkramAbdulKareem-Dr. Sadeq Al-Hamouz2016

Download

Kohonen SOM with conscience function neural network based energy efficient cluctering and routing wireless sensor networksSaad Al-Azzam . Reyadh Shaker Naoum2015

Download

New Technique for Cross-Platform Availability Control over Electronic MessagesWard Ahmed Al-Hussein , . Hebah H. O. Nasereddin2015

Download

Practical Measurements Framework for Software IntegrityOmar Natheer Basheer , . Hebah H. O. Nasereddin2015

Download

Enhance the Security of Cloud Computing Environment Using Semantic Segregation TechniquesRami Yaser Matarneh. Ahmad K. A. Kayed2015

Download

User Authentication System Using Emoji pictures passwordsRaghda Ahmed Malih - Mohammed Abbas Fadhil Al-Husainy2015

Download

Secure Communication Based on Encryption and LSB Steganography VoiceEmad Tariq Allawi - Sadeq AlHamouz2015

Download

Document Classification Method Based on Contents Using an Improved Multinomial Naïve Bayes ModelJunaina Jamil NajimAldin AL-Bayati - Mohammed A. F. Al-Husainy2015

Download

A New Audio Steganography Method Using Bi-LSB Embedding and Secret Message Integrity ValidationMahmood Maher Salih - Mudhafar Al-Jarrah2015

Download

A MULTI-MODEL KEYSTROKE DYNAMICS ANOMALY DETECTOR FOR USER AUTHENTICATIONSajjad Ali Al-Robayei - MudhafarAl-Jarrah2016

Download

Comparative Analysis for the Performance of Order Preserving Encryption TechniqueHadeel Bahjet Alkazaz - Ahmad K. A. Kayed2016

Download

A Content-Based Brain Tumor Images System for Classification, Retrieval and DiagnosisMuhannad Hamad Hussein - Sadeq AlHamouz2016

Download

Data Gathering Using Mobile Elements In Wireless Sensors Networks (WSNs)Khaled Mohammed AL-hasanat - Maamoun Khalid Ahmad2016

Download

Partial query processing over encrypted data with Object Relational Mapping.Iyad Naim - Ahmad Kayed2016

Download

Enhancing the Performance of the Hybrid Recovery Method by Defining Video Content TypeDr . Hebah H. O. Nasereddin A- -Dalia Yousef AL-Jallad2016

Download

Background Subtraction Using Coplanar Filter and Quadtree Decomposition for Objects CountingFayez Kamal ALZaghal-Dr. SadeqAlhamouz2016

Download

Comparative Study between (SVM) and (KNN) Classifiers after adding (PCA) to Improve of IntrusionDetection SystemNafea Ali Majeed Alhammadi -Dr.Sadeq AlHamouz2016

Download

Analytical Study for Measuring the Effects of Database Segregation Multi-tenancy Approaches on Cost and Performance in Cloud ComputingAla K. I. Dawoud -Ahmed Kayed2016

Download

An Enhanced model For government applications in iraqreyadh naoum,zaid ahmed nadhim2014

Download

An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion DetectionShatha Abd - Ahafid Aziz,Reyadh Shaker Naoum2014

Download

Bandwidth Saving method based Sharing Data Downloaded From Cloud Between Smartphones In Wifi NetworkAli Abbas Mohammad Alshammary,Mohammad AlHameed2014

Download

Cloud Customer Relationship Management (CRM)OntologySamar Khalid Alkubaisy,Ahmad K.A. Kayed2014

Download

Comparative analysis of Database Performance for Well-Known Cloud Computing EnviromentsJasour Ahmed Obeidat,Ahmad Al- Kayed2014

Download

Comparative Analysis of the Performance for Cloud Computing Hypervisors with Encrypted AlgorithmsAhmad Al- Kayed,Waleed Khaled Amin Abdulraheem2014

Download

Extracting instances to improve semantic matching in the domain of Renewable EnergyAhmad K. Kayed,Sadam Hamdan Ahmed2014

Download

Increasing The Lifetime of Wireless Sensor Networks using LEACH ProtocolOmar Nazar Hamdoon Shuker,Mihammed Alhamid2014

Download

Resource Allocation Technique to Obtain Energy Efficient CloudTaleen Jack Akijian,Ahmad K. Kayed2014

Download

Scaling Cloud resources under different Virtualization Hybervisors Types with Regards to Machine UtilizationSultan Ali Abu Sharkh,Ahmad Kayed2014

Download

Text Hiding in (RGBA) Images Using the Alpha Channel and Indicator MethodGhaith Salem Sarayreh,Mudhafar Al-Jarrah2014

Download

Text Image steganography Using LSD MethodAhmad Jalal Ahmad,Oleg Victoro2014

Download

new techniqure to embed encrypted or code in colored image by using first and third lsbmuataz safauldeen abdulrahman,hebah nasereddin2014

Download

Back Propagation Recursive Least Squares Algorithm for Intrusion Detection SystemsOmar Hisham Rasheed Al-sadoon. Reyadh Shaker Naoum2014

Download

Multimedia Information Acquisition and Retrieval Enhancement using Intelligent Search System_.Maamoun Khalid Ahmad,Salameh Ahmad Salameh AL-Etaywi2015

Download

Cost Break-Even Model for Cloud ComputingRaghda Abdulbaqi Mugher . Ahmad K. A. Kayed2015

Download

Computer Aided Diagnosis of Breast Cancer Using Image Processing Techniques and Neural Networks with Logistic RegressionRajaa Faraj Mahmoud Suleiman. MudhafarAl-Jarrah2015

Download

Deriving a new Markup Language from the Extensible Markup Language (XML) to enhance Electrical Engineering ApplicaionsAreej Yousef Abu Hadbah,Heba H.O. Nasereddin2014

Download

a hybrid broadcasting technique based on massage priority in vanetalaa m . alsaffar,maamoun ahmed2014

Download

A Model of Environment Representation Architecture for Intelligent RobotHussein H. Owaied,Musa Abdullah Hameed Aldouri2014

Download

A new approach for real time Face recognition System using a modified Eigenfaces with Edge TrackingRanda Mohammad Sharif Maraqa,Abdelfatah Aref Tamimi2014

Download

An Enhanced Classifier for an Authentication in Keystroke Dynamics Using Experimental DataAbdullah Osamah Al- Rahmani,Mudhafar Al- Jarrah2014

Download

Developing a computer - based information system to improve the diagnosis of blood anemiabashar abdallah issa khawaldeh,basim alhadidi2013

Download

Developing a high-performance adjustable-quality data compressipn scheme for multimedia messaginghussein al-bahadili,tamer waleed alsous2013

Download

Enhanced k_way method in apriori algorithm for mining the association rules through embedding SQL commandsHazim Farhan,basel ali dbwan2013

Download

Enhancement of a steganographic algorithm for hiding text messages in imageoleg viktorov,yazan abdallah H . seidan2013

Download

Enhancing open space method in data hiding technique - text under textyaman fakhri issa abdallah,hebah H.O. nasereddin2013

Download

Enhancing the compression ratio of the HCDC-based text compression schemehussein al-bahadili,ahmed imad mohammed ali2013

Download

hybrid technique for arabic text compressionenas mahmoud abu jrai,arafat awajan2013

Download

latent semantic analysis LSA and ontological concepts to support e-recruitmentAhmad K.A.Kayed,khaleel quftan al-lasassmeh2013

Download

Real time arabic translation system for signboard images based on printed character recognitionshoroq almamon alsharari,rafeeq abdul rahman a. al-hashemi2013

Download

Using semantic ontology to evaluate tenders and bidders for e-government applicationsAhmad K.A.Kayed,abdullah rashed al kashem2013

Download

a semantic ontology based concept for measuring security compliance of cloud service providersmustafa nouman murad al-hassan,mohammad alharibat2013

Download

An efficient associative classification algorithm for text categorizationbashar suleiman abdallah aburumman,fadi fayez abdel-jaber2013

Download

An enhanced hopfield network model for misuse intrusion detection systemreyadh naoum,zaid jameel al-nuimat2013

Download

An enhanced technique for segmentation and encrypt data to storing in cloud computinghazim A. Farhan,talal abdulkarem aldhaheri2013

Download

automobile accident prediction and avoidance system using multilayer preceptron neural networksoleg viktorov,omar abd-elaziz ibrahim2013

Download

design and implementation of knowledge-based system for text retrieval based on context and user's prior knowledgeghaith abdulsattar alkubaisi,hussein h.owaied2013

Download

Communication impact on non-contiguous allocation strategies for 2- D mesh multicomputer systemreyadh naoum,zaid mustafa al-lami,suliman bani-ahmad2012

Download

Design and implementation of portal system for schools in less-developed area : A field study in karak governorateHussein Hadi Owaied,ahmad tawfiq alhalhouli2012

Download

Developing a decision support system for seaport management case study : iraqi seaportshazim A. Farhan,ammar abdul wahhab abdul hakeem2012

Download

Developing a virtual-machine-based distributed web crawling modelhamzah mahmoud qtishat,hussein al-bahadili2012

Download

enhancing the bellovin and cheswick's algorithm by adding dummy values and reoder processfadi yousef ali eshtaiwi,oleg viktorov2012

Download

Framework model for strategic planning using dynamic workflowabdulameer khalaf hussain,zaid mohammad al-alqanabu -hamour2012

Download

Geographical information systems in analysis and enhancement for problems solving and decision makingzaid farhood makki,alaa H. alhamami2012

Download

Improving scheduling on symmetric multiprocessing SMP architecture based on process behaviorHussein Hadi Owaied,ali mousa alrahahleh2012

Download

Modeling and analysis of cloud collaborative commercehussein al-bahadili,awad al sabbah2012

Download

XML database schema refinement through functional dependencies and normalizationMusbah M. Aqel,zina zuhair al shamaa2012

Download

A framework model for arabic handwritten text recognittion to handle missing text fragmentsbaha abd al-wahhab al-garalleh,hussein hadi owaied2013

Download

A model for handwriting recognition using wavelet function and genetic algorithmHussein H. Owaied,ali ibrahim al alusi2013

Download

an efficient digital image watermarking system based on contourlet transform and discrete wavelet transformNidal Shilbayeh,zainab nouman yousif alqudsy2011

Download

Anonymous and non-repudiation E-cash scheme based on partially blind sigatureNidal Shilbayeh,hani M. almatari2011

Download

desigen of intelligent database system for vehicle fault diagnosisHussein H. Owaied,saeed mohammad saeed tayem2011

Download

intrusion detection model inspired by immune using k-means and naive bayes as hybrid learning approachhazim A. Farhan,emad fares salim islim2011

Download

A comparative study of duplicate record detection techniquesMusbah M. Aqel,osama helmi akel2011

Download

A Hybrid statistical and morphological arabic language diacritizing systemabdullah mamoun hattab,abdulameer khalaf hussain2012

Download

A Knowledge acquisition framework in trace - based reasoning for valuing knowledgeHussein H. Owaied,dareen sayed khattab2012

Download

A Proposed software description language for representing program logic in XMLkhaled zuhair mahmoud,azzam sleit2012

Download

An enhanced steady state genetic algorithm model for misuse network intrusion detection systemreyadh naoum,firas mohammad ahmad alabsi2012

Download

Designing A model for Wireless Load Data Sheet in AircraftMohammad Ahmad Mahmoud Yousef,Hazim Farhan2010

Download

Developing a Payment System Using Contactless Smart cardAyman Jamal Najm,hazim A. Farhan2010

Download

mouse Gestural hindi Digits Recopgnition Using Neural NetworkNidal Shilbayeh,Maisa M. naser2010

Download

THE VERIFICATION FROM THE CITIZEN IN E-GOVERNMENT APPLICATIONHazim Farhan,Yaser Rasheed Ali Jasim2010

Download

Towards An Ontology for Software Product Quality AttributesAhmad Abdelhafiz Samhan,Mohammad A. Al Fayoumi2008

Download

A Model For E-Learnhng Content DesignRasha faiq Suliman Aljaafreh,Mohammad A. Al-Fayoumi2009

Download

A Multi-Layer Perceptron neural network Based -model for Face DetectionNidal Shilbayeh,Ghaith Ahmad Al-Qudah2009

Download

design and implementation of mobile learning content modeleman fraij karadsheh.2009

Download

Designing A Secure E- Payment protocolMahmmoud Muslem Ishtean Al- Tarawneh,Mohammad Al-Fayoumi2009

Download

Towards Ontology For Reguirements Engineering process in E-Government ApplicationMohammad Nizar AHMAD,Mohammad A.Al Fayoumi,Ahmad K.A.Kayed2009

Download

Deriving System Model From Business Process Model (JCR Case Study)Ahmad Jehad Ghazal Mohammad Al – Fayoumi2009

Download

A knowledge based system for developing cognitive map based on geographical mapHussein H. Owaied,ali mohammad rawashdeh2010

Download

A model for Outsourcing Monitoring SystemAnas Ali Al-Kasasbeh - Hussein Hadi Owaied2010

Download

A Robust Framework for Watermarking SystemNidal Shilbayeh,Adham mohsin Seed Alshamary2010

Download

Database fragmentation Technque for News WebsitesMohammad A. Al-Fayoumi,Wael Sulaiman Hamad Al- murafi2010

Download

Design A Model for Dynamic workflow Management Systemyazan Waleed Ahmad Hudeib,Hussein Hadi Owaied Al- shemery2010

Download

A Customer - Oriented Software Development Life CycleYazan Al. Masafah,Ali Meligy2008

Download

A Decision Support System for E-banking Adoption in Jordan : A Critical Success Factors PerspectiveMohammed Abdulkareem AbuKhadegeh2008

Download

A Generic Menu - Based Interface for Web QueryingMusbah AQEL2008

Download

A Model For Designing And Adapting Mobile Learning ContentZaina Abdel Hamid Hamdan,M2008

Download

An Intelligent Face Authentication System for ATM aAccessAbdallah Mahmoud Saleh Asrawi,Nidal Shilbayeh2008

Download

Design Secure E-Voting SchemeSattar J Aboud,Omar Al Hnaity2008

Download

Embedding Hex-Cells into Tree- Hybercube NetworkAwad Ibrahim,Prof.Dr.Ali Meligy2008

Download