Search

Your search keyword '"Mohammed Amin Almaiah"' showing total 152 results

Search Constraints

Start Over You searched for: Author "Mohammed Amin Almaiah" Remove constraint Author: "Mohammed Amin Almaiah"
152 results on '"Mohammed Amin Almaiah"'

Search Results

1. Adoption deep learning approach using realistic synthetic data for enhancing network intrusion detection in intelligent vehicle systems

2. Factors influencing students' attitude toward to use mobile learning applications using SEM-ANN hybrid approach

3. Green environmental management system and environmental performance: Results from PLS-SEM and fsQCA

4. Analyzing Socio-Academic Factors and Predictive Modeling of Student Performance Using Machine Learning Techniques

5. Technology factors and ERP system efficiency in the Jordanian industrial firms: does company size matter?

6. Enhancing the internal auditors' effectiveness in jordanian companies: The impact of cloud-based accounting usage and the moderating role of digital proficiency

7. A Literature Review on Cybersecurity Risks and Challenges Assessments in Virtual Power Plants: Current Landscape and Future Research Directions

8. Security Risk and Breach Detection Approach Based Blockchain for Medical Applications

9. The influence of using smart technologies for sustainable development in higher education institutions

10. Enhancing cyber governance in Islamic banks: The influence of artificial intelligence and the moderating effect of Covid-19 pandemic

11. The impact of using types of artificial intelligence technology in monitoring tax payments

12. Detecting DDoS attacks using machine learning algorithms and feature selection methods

13. Streamlining supply chains: An efficiency-driven permissioned blockchain framework for data reduction

14. Modelling and predicting student flexibility in online learning using artificial intelligence approaches

15. D-BlockAuth: An Authentication Scheme-Based Dual Blockchain for 5G-Assisted Vehicular Fog Computing

16. A Decade of Green Economic Literature: An Analysis-Based Bibliometric

17. Crafting Robust Brands for Premium Pricing: Understanding the Synergy of Brand Strength, Loyalty, and Attachment

18. The influence of artificial intelligence on the AISs efficiency: Moderating effect of the cyber security

19. The impact of empowering internal auditors on the quality of electronic internal audits: A case of Jordanian listed services companies

20. Examining the critical factors of internal audit effectiveness from internal auditors’ perspective: Moderating role of extrinsic rewards

21. Enhancing VAT compliance in the retail industry: The role of socio-economic determinants and tax knowledge moderation

22. Examining the influence of trust and perceived risk on customers intention to use NFC mobile payment system

23. Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms

24. A New Technological Model on Investigating the Utilization of Mobile Learning Applications: Extending the TAM

25. Factors influencing the adoption of internet banking: An integration of ISSM and UTAUT with price value and perceived risk

26. Associative Classification in Multi-label Classification: an Investigative Study

27. Multi-Agent System Combined With Distributed Data Mining for Mutual Collaboration Classification

28. Improving Energy Efficiency With Content-Based Adaptive and Dynamic Scheduling in Wireless Sensor Networks

29. Analysis the Effect of Different Factors on the Development of Mobile Learning Applications at Different Stages of Usage

30. The Role of Compatibility and Task-Technology Fit (TTF): On Social Networking Applications (SNAs) Usage as Sustainability in Higher Education

31. An Energy Proficient Load Balancing Routing Scheme for Wireless Sensor Networks to Maximize Their Lifespan in an Operational Environment

32. MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks

33. An Efficient Load Balancing Scheme of Energy Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks

34. Applying the UTAUT Model to Explain the Students’ Acceptance of Mobile Learning System in Higher Education

35. Analysis of the Effect of Course Design, Course Content Support, Course Assessment and Instructor Characteristics on the Actual Use of E-Learning System

36. A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things

37. A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS

38. An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network

39. Empirical investigation to explore factors that achieve high quality of mobile learning system based on students’ perspectives

40. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks

Catalog

Books, media, physical & digital resources