Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
Ahmad S. TarawnehUniversity of PetraVerified email at uop.edu.jo
Surya PrasathAssistant Professor, Cincinnati Children's Hospital Medical Center, University of CincinnatiVerified email at cchmc.org
Ghada AltarawnehAssociate professor of accounting, Mutah UniversityVerified email at mutah.edu.jo
Esra'a AlkafaweenMutah UniversityVerified email at mutah.edu.jo
Mahmoud Bashir AlhasanatCollege of Engineering, Al-Hussein Bin Talal UniversityVerified email at ahu.edu.jo
Mohammad Ali AbbadiMutah UniversityVerified email at mutah.edu.jo
Mouhammd AlkasassbehProfessor of cyber security, Princess Sumaya University for Technology, JordanVerified email at psut.edu.jo
Dmitry Chetverikovprofessor emeritus, ELTEVerified email at sztaki.hu
Khalid ALMOHAMMADIAssociate Professor of Artificial Intelligence at Tabuk UniversityVerified email at ut.edu.sa
Malek Qalit AlrashidiUniversity of TabukVerified email at ut.edu.sa
Hamzeh Eyal SalmanAssociate Professor in Software Engineering, Mutah UniversityVerified email at mutah.edu.jo
Awni Hammouriprofessor of computer science, Mutah universityVerified email at mutah.edu.jo
Omar LasassmehMutah UniversityVerified email at mutah.edu.jo
Mansoor A. Al GhamdiUniversity of TabukVerified email at ut.edu.sa
Ghazi Al-NaymatAjman UniversityVerified email at ajman.ac.ae
Esra'a AlhasanatVerified email at ahu.edu.jo
Chaman Verma, Ph.DEOTVOS LORAND UNIVERSITYVerified email at inf.elte.hu
Hossam FarisProfessor, The University of JordanVerified email at ju.edu.jo
Ahmad AlhasanatUniversity of CincinnatiVerified email at mail.uc.edu
Prof. Bassam MahadeenMutah UniversityVerified email at mutah.edu.jo
Follow
Ahmad Hassanat
Professor of computer science, Mutah University
Verified email at mutah.edu.jo - Homepage