Follow
Mohammad Hujooj
Mohammad Hujooj
Al-Balqa Applied University and Fahad Bin Sultan University
Verified email at bau.edu.jo - Homepage
Title
Cited by
Cited by
Year
Lossless image compression technique using combination methods
A Alarabeyyat, S Al-Hashemi, T Khdour, MH Btoush, S Bani-Ahmad, ...
Journal of Software Engineering and Applications 5 (10), 752, 2012
612012
Rule based approach for Arabic part of speech tagging and name entity recognition
MH Btoush, A Alarabeyyat, I Olab
International Journal of Advanced Computer Science and Applications 7 (6), 2016
182016
Minimizing delays in the Jordanian construction industry by adopting BIM technology
M Btoush, AT Harun
IOP Conference Series: Materials Science and Engineering 271 (1), 012041, 2017
172017
Research Article PM10 Forecasting Using Soft Computing Techniques
MF Ababneh, O Ala’a, MH Btoush
Research Journal of Applied Sciences, Engineering and Technology 7 (16 …, 2014
172014
Understanding BIM adoption in the AEC industry: the case of Jordan
M Btoush, AT Haron
IOP Conference Series: Materials Science and Engineering 271 (1), 012044, 2017
132017
Evaluation of e-government services in Jordan: Providers' and users' perceptions
MAH Btoush
PQDT-Global, 2009
112009
INCREASING INFORMATION SECURITY INSIDE ORGANIZATIONS THROUGH AWARENESS LEARNING FOR EMPLOYEES.
M BTOUSH, A ALARABEYAT, M ZBOON, O RYATI, M HASSAN, ...
Journal of Theoretical & Applied Information Technology 24 (2), 2011
102011
Comparative Review of e-service Maturity Models: 6I Model.
MH Btoush, JIA Siddiqi, M Grimsley, B Akhgar, Ja'far Alqatawna
CSREA EEE, 3-9, 2008
92008
Online Courses Quality and Distance Education Amid COVID-19 Pandemic: Al-Balqa Applied University-IT Faculty Students’ Perceptions
M Hjouj Btoush
International Journal of Knowledge and Learning 15 (1), 1-15, 2022
82022
A complexity analysis and entropy for different data compression algorithms on text files
MH Btoush, ZE Dawahdeh
Journal of computer and communications 6 (1), 301-315, 2017
82017
The state of play in jordanian E-government services
MH Btoush, J Siddiqi, J Alqatawna, B Akhgar
2009 Sixth International Conference on Information Technology: New …, 2009
82009
E-business security: Methodological considerations
J Alqatawna, J Siddiqi, B Akhgar, MH Btoush
World Academy of Science, Engineering and Technology 49, 624-631, 2009
82009
Government’s presence on social media a study with special reference to Jordan
MH Btoush
Research Journal of Applied Sciences, Engineering and Technology 7 (22 …, 2014
72014
Analyzing and detecting malicious content: DOCX files
AM Naser, MH Btoush, AH Hadi
International Journal of Computer Science and Information Security 14 (8), 404, 2016
62016
Towards Holistic Approaches to Secure e-Business: A Critical Review.
Ja'far Alqatawna, JIA Siddiqi, B Akhgar, MH Btoush
CSREA EEE, 245-251, 2008
52008
A new approach for enhancing the quality of medical computerized tomography images
M Al-Frejat, M HjoujBtoush
International Journal of Advanced Computer Science and Applications 7 (5), 2016
42016
A Holistic Framework for Secure e-Business
J Alqatawna, J Siddiqi, B Akhgar, M Hjouj Btoush
Proceedings of EEE 8, 14-17, 2008
42008
Observations on compressing text files of varying length
MH Btoush, J Siddiqi, B Akhgar, Z Dawahdeh
Fifth International Conference on Information Technology: New Generations …, 2008
42008
A hybrid convolutional neural network model for detection of diabetic retinopathy
M Alshawabkeh, MH Ryalat, OM Dorgham, K Alkharabsheh, MH Btoush, ...
International Journal of Computer Applications in Technology 70 (3-4), 179-196, 2022
32022
Do insecure systems increase global digital divide?
J Siddiqi, J Alqatawna, MH Btoush
Global Business: Concepts, Methodologies, Tools and Applications, 2102-2111, 2011
22011
The system can't perform the operation now. Try again later.
Articles 1–20