Lossless image compression technique using combination methods A Alarabeyyat, S Al-Hashemi, T Khdour, MH Btoush, S Bani-Ahmad, ... Journal of Software Engineering and Applications 5 (10), 752, 2012 | 62 | 2012 |
Minimizing delays in the Jordanian construction industry by adopting BIM technology M Btoush, AT Harun IOP Conference Series: Materials Science and Engineering 271 (1), 012041, 2017 | 20 | 2017 |
Rule based approach for Arabic part of speech tagging and name entity recognition MH Btoush, A Alarabeyyat, I Olab International Journal of Advanced Computer Science and Applications 7 (6), 2016 | 18 | 2016 |
Research Article PM10 Forecasting Using Soft Computing Techniques MF Ababneh, O Ala’a, MH Btoush Research Journal of Applied Sciences, Engineering and Technology 7 (16 …, 2014 | 17 | 2014 |
Understanding BIM adoption in the AEC industry: the case of Jordan M Btoush, AT Haron IOP Conference Series: Materials Science and Engineering 271 (1), 012044, 2017 | 13 | 2017 |
Evaluation of e-government services in Jordan: Providers' and users' perceptions MAH Btoush PQDT-Global, 2009 | 11 | 2009 |
Online Courses Quality and Distance Education Amid COVID-19 Pandemic: Al-Balqa Applied University-IT Faculty Students’ Perceptions M Hjouj Btoush International Journal of Knowledge and Learning 15 (1), 1-15, 2022 | 10 | 2022 |
INCREASING INFORMATION SECURITY INSIDE ORGANIZATIONS THROUGH AWARENESS LEARNING FOR EMPLOYEES. M BTOUSH, A ALARABEYAT, M ZBOON, O RYATI, M HASSAN, ... Journal of Theoretical & Applied Information Technology 24 (2), 2011 | 10 | 2011 |
A complexity analysis and entropy for different data compression algorithms on text files MH Btoush, ZE Dawahdeh Journal of computer and communications 6 (1), 301-315, 2017 | 9 | 2017 |
Comparative Review of e-service Maturity Models: 6I Model. MH Btoush, JIA Siddiqi, M Grimsley, B Akhgar, Ja'far Alqatawna CSREA EEE, 3-9, 2008 | 9 | 2008 |
Analyzing and detecting malicious content: DOCX files AM Naser, MH Btoush, AH Hadi International Journal of Computer Science and Information Security 14 (8), 404, 2016 | 8 | 2016 |
The state of play in jordanian E-government services MH Btoush, J Siddiqi, J Alqatawna, B Akhgar 2009 Sixth International Conference on Information Technology: New …, 2009 | 8 | 2009 |
E-business security: Methodological considerations J Alqatawna, J Siddiqi, B Akhgar, MH Btoush World Academy of Science, Engineering and Technology 49, 624-631, 2009 | 8 | 2009 |
Government’s presence on social media a study with special reference to Jordan MH Btoush Research Journal of Applied Sciences, Engineering and Technology 7 (22 …, 2014 | 7 | 2014 |
Biotechnical neural network system for predicting cardiovascular health state using processing of bio-signals SF Maxim Borisovich Myasnyankin, Saleh Aloqeili, Nikolay Korenevskiy, Mahdi ... International Journal of Medical Engineering and Informatics 16 (4), 324-349, 2024 | 5 | 2024 |
Towards Holistic Approaches to Secure e-Business: A Critical Review. Ja'far Alqatawna, JIA Siddiqi, B Akhgar, MH Btoush CSREA EEE, 245-251, 2008 | 5 | 2008 |
A hybrid convolutional neural network model for detection of diabetic retinopathy M Alshawabkeh, MH Ryalat, OM Dorgham, K Alkharabsheh, MH Btoush, ... International Journal of Computer Applications in Technology 70 (3-4), 179-196, 2022 | 4 | 2022 |
A new approach for enhancing the quality of medical computerized tomography images M Al-Frejat, M HjoujBtoush International Journal of Advanced Computer Science and Applications 7 (5), 2016 | 4 | 2016 |
A Holistic Framework for Secure e-Business J Alqatawna, J Siddiqi, B Akhgar, M Hjouj Btoush Proceedings of EEE 8, 14-17, 2008 | 4 | 2008 |
Observations on compressing text files of varying length MH Btoush, J Siddiqi, B Akhgar, Z Dawahdeh Fifth International Conference on Information Technology: New Generations …, 2008 | 4 | 2008 |