عربي
Jobs & Scholarships
University Website
Contact Us
Quick Links
Registration
UJ Hospital
Library
Language Center
UJ News
Regulations
Learning Guide
E-Learning
Employee Portal
Phonebook
UJ Yearbook
Policies, Procedures and Forms
How to Apply
About Us
Our Strategy
Organizational Chart
Dean's Message
Successive Deans
Deanship Office
School Board
Structure
Facts & Figures
Faculty Members
Previous Faculty Members
Administrative Staff
Departments
Computer Science
Computer Information Systems
Information Technology
Artificial Intelligence
Programs
Undergraduate
Graduate
Faculty Facilities
Education & Research
Sports
Social Entertainment
Other Facilities
Achievements
Miscellaneous
Forms
Collaboration
Conferences
User Manual for application Systems
Elearning Office
About Us
Our Strategy
Organizational Chart
Dean's Message
Successive Deans
Deanship Office
School Board
Structure
Facts & Figures
Faculty Members
Previous Faculty Members
Administrative Staff
Department
Computer Science
Computer Information Systems
Information Technology
Artificial Intelligence
Programs
Undergraduate
Graduate
Faculty Facilities
Education & Research
Sports
Social Entertainment
Other Facilities
Achievements
Miscellaneous
Forms
Collaboration
Conferences
User Manual for application Systems
Elearning Office
Contact Us
عربي
King Abdullah II School of Information Technology - Department of Computer Science
Study Plans
Research
Courses
Programs
Academic Staff
Strategy
Oriented stochastic loss descent algorithm to train very deep multi-layer neural networks without vanishing gradients
10/27/2021
Hybrid harmony search algorithm for social network contact tracing of COVID-19
6/28/2021
Detecting and Preventing SQL Injection Attacks: A Formal Approach.
10/20/2016
A Hybrid Steganography System based on LSB Matching and Replacement
9/1/2016
Identifying Energy-Deprivation in Wireless Sensor Networks.
5/19/2016
Algebraic model for handling access control policies.
5/12/2016
Generating statistical insights into network behavior using SKETURE
2/10/2016
A temporal defeasible logic for handling access control policies.
1/1/2016