متابعة
Mohammad Alia
Mohammad Alia
انتساب غير معروف
ليس هناك بريد إلكتروني تم التحقق منه
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Evaluation online learning of undergraduate students under lockdown amidst COVID-19 Pandemic: The online learning experience and students’ satisfaction
M Maqableh, M Alia
Children and youth services review 128, 106160, 2021
3652021
A review of natural language processing and machine learning tools used to analyze arabic social media
T Kanan, O Sadaqa, A Aldajeh, H Alshwabka, S AlZu’bi, M Elbes, ...
2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019
612019
Public–key steganography based on matching method
MA Alia, A Yahya
European Journal of Scientific Research 40 (2), 223-231, 2010
492010
Solving transportation problems using the best candidates method
AA Hlayel, MA Alia
Computer Science & Engineering 2 (5), 23, 2012
442012
Face recognition system based on different artificial neural networks models and training algorithms
ONA AL-Allaf, AA Tamimi, MA Alia
International Journal of Advanced Computer Science and Applications 4 (6), 2013
372013
New hash function based on chaos theory (CHA-1)
M Maqableh, AB Samsudin, MA Alia
International Journal of Computer Science and Network Security 8 (2), 20-27, 2008
352008
A survey on sql injection attack: Detection and challenges
Z Marashdeh, K Suwais, M Alia
2021 International Conference on Information Technology (ICIT), 957-962, 2021
302021
E-voting protocol based on public-key cryptography
HK Al-Anie, MA Alia, AA Hnaif
International Journal of Network Security & Its Applications 3 (4), 87-98, 2011
302011
Enhancing cuckoo search algorithm by using reinforcement learning for constrained engineering optimization problems
M Shehab, AT Khader, MA Alia
2019 IEEE Jordan international joint conference on electrical engineering …, 2019
282019
A new digital signature scheme based on Mandelbrot and Julia fractal sets
MA Alia, AB Samsudin
American Journal of Applied Sciences 4 (11), 850-858, 2007
282007
Cryptography based authentication methods
MA Alia, AA Tamimi, ON Al-Allaf
Proceedings of the world congress on engineering and computer science 1, 1-6, 2014
242014
Integrated system for monitoring and recognizing students during class session
MA Alia, AA Tamimi, ONA Al-Allaf
The International Journal of Multimedia & Its Applications 5 (6), 45, 2013
242013
Design of fuzzy PD-controlled overhead crane system with anti-swing compensation
A Shebel, S Maazouz, Z Mohammed Abu, A Mohammad, R Ayman Al
Engineering 2011, 2011
242011
New key exchange protocol based on Mandelbrot and Julia fractal sets
M Alia, A Samsudin
International journal of computer science and network security 7 (2), 302-307, 2007
242007
A design of a PID self-tuning controller using LabVIEW
MAK Alia, TM Younes, SA Alsabbah
Journal of Software Engineering and Applications 4 (3), 161, 2011
232011
Real-time group face-detection for an intelligent class-attendance system
AA Tamimi, ONA AL-Allaf, MA Alia
International Journal of Information Technology and Computer Science (IJITCS …, 2015
182015
A NOVEL IMAGE STEGANOGRAPHIC SYSTEM BASED ON EXACT MATCHING ALGORITHM AND KEY-DEPENDENT DATA TECHNIQUE.
MA Alsarayreh, MA Alia, KA Maria
Journal of Theoretical & Applied Information Technology 95 (5), 2017
162017
A new public-key cryptosystem based on mandelbrot and julia fractal sets
M Alia, A Samsudin
Asian Journal of Information Technology, AJIT 6 (5), 567-575, 2007
162007
Parallel scalable approximate matching algorithm for network intrusion detection systems.
A Hnaif, KM Jaber, MA Alia, M Daghbosheh
Int. Arab J. Inf. Technol. 18 (1), 77-84, 2021
152021
Acoustic temperature transducer
TM Younes, MAK Alia, S Al-Sabbah
Sensors & Transducers 119 (8), 46, 2010
152010
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20