Search

Your search keyword '"Mohammed Amin Almaiah"' showing total 152 results

Search Constraints

Start Over You searched for: Author "Mohammed Amin Almaiah" Remove constraint Author: "Mohammed Amin Almaiah"
152 results on '"Mohammed Amin Almaiah"'

Search Results

57. Green Environmental Management System to Support Environmental Performance: What Factors Influence SMEs to Adopt Green Innovations?

58. Investigating the Role of Perceived Risk, Perceived Security and Perceived Trust on Smart m-Banking Application Using SEM

59. A Neighborhood and Machine Learning-Enabled Information Fusion Approach for the WSNs and Internet of Medical Things

60. Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine Learning

61. Malay Language Learning Difficulty by International Community: A Case Study of Postgraduate Students of UNISZA and UMT

64. Managers’ Perception and Attitude toward Financial Risks Associated with SMEs: Analytic Hierarchy Process Approach

65. Android Malware Detection System Based on Ensemble Learning

67. The Role of E-Accounting Adoption on Business Performance: The Moderating Role of COVID-19

68. Influence of Digital Accounting System Usage on SMEs Performance: The Moderating Effect of COVID-19

69. A Conceptual Model for Investigating the Effect of Privacy Concerns on E-Commerce Adoption: A Study on United Arab Emirates Consumers

71. Actual Use of Mobile Learning Technologies during Social Distancing Circumstances: Case Study of King Faisal University Students

72. Multi-Agent System Combined With Distributed Data Mining for Mutual Collaboration Classification

73. Business Sustainability of Small and Medium Enterprises during the COVID-19 Pandemic: The Role of AIS Implementation

74. Revolutionizing Solar Power Production with Artificial Intelligence: A Sustainable Predictive Model

75. Factors Influencing the Adoption of Big Data Analytics in the Digital Transformation Era: Case Study of Jordanian SMEs

79. Examining the Factors Influencing the Mobile Learning Applications Usage in Higher Education during the COVID-19 Pandemic

81. An Efficient Load Balancing Scheme of Energy Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks

82. Improving Energy Efficiency With Content-Based Adaptive and Dynamic Scheduling in Wireless Sensor Networks

83. Analysis the Effect of Different Factors on the Development of Mobile Learning Applications at Different Stages of Usage

84. The Role of Compatibility and Task-Technology Fit (TTF): On Social Networking Applications (SNAs) Usage as Sustainability in Higher Education

85. Crowd-reflecting: a counterproductive experience of Arab adult learning via technology

86. Investigating the Effect of Perceived Security, Perceived Trust, and Information Quality on Mobile Payment Usage through Near-Field Communication (NFC) in Saudi Arabia

87. Antecedents of Big Data Analytic Adoption and Impacts on Performance: Contingent Effect

88. Examining the Impact of Artificial Intelligence and Social and Computer Anxiety in E-Learning Settings: Students’ Perceptions at the University Level

89. Performance Investigation of Principal Component Analysis for Intrusion Detection System Using Different Support Vector Machine Kernels

90. Factors Affecting the Adoption of Digital Information Technologies in Higher Education: An Empirical Study

91. Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions

92. Measuring Institutions’ Adoption of Artificial Intelligence Applications in Online Learning Environments: Integrating the Innovation Diffusion Theory with Technology Adoption Rate

93. Machine Learning Classifiers for Network Intrusion Detection System: Comparative Study

94. Cybersecurity in Industrial Control System (ICS)

95. Cyber Security Threats in Cloud: Literature Review

96. Cybersecurity Concerns in Smart-phones and applications: A survey

97. Data an Overview of Cybersecurity Threats on Credit Card Companies and Credit Card Risk Mitigation

98. The Art of Cyber Defense : From Risk Assessment to Threat Intelligence

99. Risk Assessment and Countermeasures for Cybersecurity

100. Machine Intelligence Applications in Cyber-Risk Management

Catalog

Books, media, physical & digital resources