Follow
Mohammad A. Alia
Mohammad A. Alia
Professor - Computer Science. Al Zaytoonah University of Jordan
Verified email at zuj.edu.jo - Homepage
Title
Cited by
Cited by
Year
Evaluation online learning of undergraduate students under lockdown amidst COVID-19 Pandemic: The online learning experience and students’ satisfaction
M Maqableh, M Alia
Children and youth services review 128, 106160, 2021
3592021
A review of natural language processing and machine learning tools used to analyze arabic social media
T Kanan, O Sadaqa, A Aldajeh, H Alshwabka, S AlZu’bi, M Elbes, ...
2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019
612019
Public–key steganography based on matching method
MA Alia, A Yahya
European Journal of Scientific Research 40 (2), 223-231, 2010
492010
Solving transportation problems using the best candidates method
AA Hlayel, MA Alia
Computer Science & Engineering 2 (5), 23, 2012
432012
Face recognition system based on different artificial neural networks models and training algorithms
ONA AL-Allaf, AA Tamimi, MA Alia
International Journal of Advanced Computer Science and Applications 4 (6), 2013
372013
New hash function based on chaos theory (CHA-1)
M Maqableh, AB Samsudin, MA Alia
International Journal of Computer Science and Network Security 8 (2), 20-27, 2008
352008
A survey on sql injection attack: Detection and challenges
Z Marashdeh, K Suwais, M Alia
2021 International Conference on Information Technology (ICIT), 957-962, 2021
302021
E-voting protocol based on public-key cryptography
HK Al-Anie, MA Alia, AA Hnaif
International Journal of Network Security & Its Applications 3 (4), 87-98, 2011
302011
A new digital signature scheme based on Mandelbrot and Julia fractal sets
MA Alia, AB Samsudin
American Journal of Applied Sciences 4 (11), 850-858, 2007
282007
Enhancing cuckoo search algorithm by using reinforcement learning for constrained engineering optimization problems
M Shehab, AT Khader, MA Alia
2019 IEEE Jordan international joint conference on electrical engineering …, 2019
272019
Cryptography based authentication methods
MA Alia, AA Tamimi, ON Al-Allaf
Proceedings of the world congress on engineering and computer science 1, 1-6, 2014
242014
Integrated system for monitoring and recognizing students during class session
MA Alia, AA Tamimi, ONA Al-Allaf
The International Journal of Multimedia & Its Applications 5 (6), 45, 2013
242013
New key exchange protocol based on Mandelbrot and Julia fractal sets
M Alia, A Samsudin
International journal of computer science and network security 7 (2), 302-307, 2007
242007
Real-time group face-detection for an intelligent class-attendance system
AA Tamimi, ONA AL-Allaf, MA Alia
International Journal of Information Technology and Computer Science (IJITCS …, 2015
182015
A NOVEL IMAGE STEGANOGRAPHIC SYSTEM BASED ON EXACT MATCHING ALGORITHM AND KEY-DEPENDENT DATA TECHNIQUE
KABUM MAHER A. ALSARAYREH , MOHAMMAD A. ALIA
Journal of Theoretical and Applied Information Technology 95 (5), 2017
162017
A new public-key cryptosystem based on mandelbrot and julia fractal sets
M Alia, A Samsudin
Asian Journal of Information Technology, AJIT 6 (5), 567-575, 2007
162007
Parallel scalable approximate matching algorithm for network intrusion detection systems.
A Hnaif, KM Jaber, MA Alia, M Daghbosheh
Int. Arab J. Inf. Technol. 18 (1), 77-84, 2021
152021
A novel method for localising a randomly distributed wireless sensor network
AAA Alkhatib, M Alia, A Hnaif, S Yousef
International Journal of System Assurance Engineering and Management 9, 354-361, 2018
142018
A tutorial on singular value decomposition with applications on image compression and dimensionality reduction
Y Jaradat, M Masoud, I Jannoud, A Manasrah, M Alia
2021 international conference on information technology (ICIT), 769-772, 2021
132021
Multiprocessing scalable string matching algorithm for network intrusion detection system
AA Hnaif, A Aldahoud, MA Alia, IS Al'otoum, D Nazzal
International Journal of High Performance Systems Architecture 8 (3), 159-168, 2018
132018
The system can't perform the operation now. Try again later.
Articles 1–20