Evaluation online learning of undergraduate students under lockdown amidst COVID-19 Pandemic: The online learning experience and students’ satisfaction M Maqableh, M Alia Children and youth services review 128, 106160, 2021 | 380 | 2021 |
A review of natural language processing and machine learning tools used to analyze arabic social media T Kanan, O Sadaqa, A Aldajeh, H Alshwabka, S AlZu’bi, M Elbes, ... 2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019 | 65 | 2019 |
Public–key steganography based on matching method MA Alia, A Yahya European Journal of Scientific Research 40 (2), 223-231, 2010 | 49 | 2010 |
Solving transportation problems using the best candidates method AA Hlayel, MA Alia Computer Science & Engineering 2 (5), 23, 2012 | 43 | 2012 |
Face recognition system based on different artificial neural networks models and training algorithms ONA AL-Allaf, AA Tamimi, MA Alia International Journal of Advanced Computer Science and Applications 4 (6), 2013 | 38 | 2013 |
New hash function based on chaos theory (CHA-1) M Maqableh, AB Samsudin, MA Alia International Journal of Computer Science and Network Security 8 (2), 20-27, 2008 | 36 | 2008 |
A survey on sql injection attack: Detection and challenges Z Marashdeh, K Suwais, M Alia 2021 International Conference on Information Technology (ICIT), 957-962, 2021 | 31 | 2021 |
E-voting protocol based on public-key cryptography HK Al-Anie, MA Alia, AA Hnaif International Journal of Network Security & Its Applications 3 (4), 87-98, 2011 | 29 | 2011 |
Enhancing cuckoo search algorithm by using reinforcement learning for constrained engineering optimization problems M Shehab, AT Khader, MA Alia 2019 IEEE Jordan international joint conference on electrical engineering …, 2019 | 28 | 2019 |
A new digital signature scheme based on Mandelbrot and Julia fractal sets MA Alia, AB Samsudin American Journal of Applied Sciences 4 (11), 850-858, 2007 | 28 | 2007 |
New key exchange protocol based on Mandelbrot and Julia fractal sets M Alia, A Samsudin International journal of computer science and network security 7 (2), 302-307, 2007 | 25 | 2007 |
Cryptography based authentication methods MA Alia, AA Tamimi, ON Al-Allaf Proceedings of the world congress on engineering and computer science 1, 1-6, 2014 | 24 | 2014 |
Integrated system for monitoring and recognizing students during class session MA Alia, AA Tamimi, ONA Al-Allaf The International Journal of Multimedia & Its Applications 5 (6), 45, 2013 | 24 | 2013 |
Real-time group face-detection for an intelligent class-attendance system AA Tamimi, ONA AL-Allaf, MA Alia International Journal of Information Technology and Computer Science (IJITCS …, 2015 | 18 | 2015 |
A new public-key cryptosystem based on mandelbrot and julia fractal sets M Alia, A Samsudin Asian Journal of Information Technology, AJIT 6 (5), 567-575, 2007 | 18 | 2007 |
An intelligent Arabic chatbot system proposed framework NA Al-Madi, KA Maria, MA Al-Madi, MA Alia, EA Maria 2021 International Conference on Information Technology (ICIT), 592-597, 2021 | 16 | 2021 |
Parallel scalable approximate matching algorithm for network intrusion detection systems. A Hnaif, KM Jaber, MA Alia, M Daghbosheh Int. Arab J. Inf. Technol. 18 (1), 77-84, 2021 | 16 | 2021 |
A NOVEL IMAGE STEGANOGRAPHIC SYSTEM BASED ON EXACT MATCHING ALGORITHM AND KEY-DEPENDENT DATA TECHNIQUE KABUM MAHER A. ALSARAYREH , MOHAMMAD A. ALIA Journal of Theoretical and Applied Information Technology 95 (5), 2017 | 16 | 2017 |
A tutorial on singular value decomposition with applications on image compression and dimensionality reduction Y Jaradat, M Masoud, I Jannoud, A Manasrah, M Alia 2021 international conference on information technology (ICIT), 769-772, 2021 | 15 | 2021 |
A novel method for localising a randomly distributed wireless sensor network AAA Alkhatib, M Alia, A Hnaif, S Yousef International Journal of System Assurance Engineering and Management 9, 354-361, 2018 | 14 | 2018 |