Evaluation online learning of undergraduate students under lockdown amidst COVID-19 Pandemic: The online learning experience and students’ satisfaction M Maqableh, M Alia Children and youth services review 128, 106160, 2021 | 363 | 2021 |
A review of natural language processing and machine learning tools used to analyze arabic social media T Kanan, O Sadaqa, A Aldajeh, H Alshwabka, S AlZu’bi, M Elbes, ... 2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019 | 61 | 2019 |
Public–key steganography based on matching method MA Alia, A Yahya European Journal of Scientific Research 40 (2), 223-231, 2010 | 49 | 2010 |
Solving transportation problems using the best candidates method AA Hlayel, MA Alia Computer Science & Engineering 2 (5), 23, 2012 | 43 | 2012 |
Face recognition system based on different artificial neural networks models and training algorithms ONA AL-Allaf, AA Tamimi, MA Alia International Journal of Advanced Computer Science and Applications 4 (6), 2013 | 37 | 2013 |
New hash function based on chaos theory (CHA-1) M Maqableh, AB Samsudin, MA Alia International Journal of Computer Science and Network Security 8 (2), 20-27, 2008 | 35 | 2008 |
A survey on sql injection attack: Detection and challenges Z Marashdeh, K Suwais, M Alia 2021 International Conference on Information Technology (ICIT), 957-962, 2021 | 30 | 2021 |
E-voting protocol based on public-key cryptography HK Al-Anie, MA Alia, AA Hnaif International Journal of Network Security & Its Applications 3 (4), 87-98, 2011 | 30 | 2011 |
A new digital signature scheme based on Mandelbrot and Julia fractal sets MA Alia, AB Samsudin American Journal of Applied Sciences 4 (11), 850-858, 2007 | 28 | 2007 |
Enhancing cuckoo search algorithm by using reinforcement learning for constrained engineering optimization problems M Shehab, AT Khader, MA Alia 2019 IEEE Jordan international joint conference on electrical engineering …, 2019 | 27 | 2019 |
Cryptography based authentication methods MA Alia, AA Tamimi, ON Al-Allaf Proceedings of the world congress on engineering and computer science 1, 1-6, 2014 | 24 | 2014 |
Integrated system for monitoring and recognizing students during class session MA Alia, AA Tamimi, ONA Al-Allaf The International Journal of Multimedia & Its Applications 5 (6), 45, 2013 | 24 | 2013 |
Design of fuzzy PD-controlled overhead crane system with anti-swing compensation A Shebel, S Maazouz, Z Mohammed Abu, A Mohammad, R Ayman Al Engineering 2011, 2011 | 24 | 2011 |
New key exchange protocol based on Mandelbrot and Julia fractal sets M Alia, A Samsudin International journal of computer science and network security 7 (2), 302-307, 2007 | 24 | 2007 |
A design of a PID self-tuning controller using LabVIEW MAK Alia, TM Younes, SA Alsabbah Journal of Software Engineering and Applications 4 (3), 161, 2011 | 23 | 2011 |
Real-time group face-detection for an intelligent class-attendance system AA Tamimi, ONA AL-Allaf, MA Alia International Journal of Information Technology and Computer Science (IJITCS …, 2015 | 18 | 2015 |
A NOVEL IMAGE STEGANOGRAPHIC SYSTEM BASED ON EXACT MATCHING ALGORITHM AND KEY-DEPENDENT DATA TECHNIQUE. MA Alsarayreh, MA Alia, KA Maria Journal of Theoretical & Applied Information Technology 95 (5), 2017 | 16 | 2017 |
A new public-key cryptosystem based on mandelbrot and julia fractal sets M Alia, A Samsudin Asian Journal of Information Technology, AJIT 6 (5), 567-575, 2007 | 16 | 2007 |
Parallel scalable approximate matching algorithm for network intrusion detection systems. A Hnaif, KM Jaber, MA Alia, M Daghbosheh Int. Arab J. Inf. Technol. 18 (1), 77-84, 2021 | 15 | 2021 |
Acoustic temperature transducer TM Younes, MAK Alia, S Al-Sabbah Sensors & Transducers 119 (8), 46, 2010 | 15 | 2010 |