This page has only limited features, please log in for full access.

Dr. Mohammed Almaiah
Assistant Professor, Faculty of Computer Sciences and Information Technology, King Faisal University, Saudi Arabia

Basic Info


Research Keywords & Expertise

0 Mobile Application Development
0 Mobile Learning
0 Network Security
0 wireless networks
0 Mobile Adhoc Networks

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
Profile ImageAlhuseen Alsayed King Abdulaziz University
Profile ImageOmar Almomani World Islamic Sciences and E...
Profile ImageMuhammad Zakarya Abdul Wali Khan University
Profile ImageAbdulrahman Essa Al Lily Department of Curriculum and...
Profile ImageMuhammad Adil Department of Computer Scien...
Following: 6 users
View all

Feed

Chapter
Published: 01 May 2021 in Studies in Big Data
Reads 0
Downloads 0

Mobile devices and applications are prone to different kinds of cyber threats and attacks that affect their users’ privacy. Therefore, there is critical need to understand all cyber threats characteristics in order to prevent their risks. However, most of cyber threats classifications are usually limited and based on one or two criteria in the classification process of threats. In addition, the current frameworks did not present an exhaustive list of cyber threats on mobile devices and applications. According to above reasons, this study proposes an exhaustive framework for mobile devices and applications-cyber security threat classifications, which includes most cyber threats classification and principles. The main purpose of our framework is to systematically identify cyber security threats, show their potential impacts, draw the mobile users’ attention to those threats, and enable them to take protective actions as appropriate.

ACS Style

Mohammed Amin Almaiah; Ali Al-Zahrani; Omar Almomani; Ahmad K. Alhwaitat. Classification of Cyber Security Threats on Mobile Devices and Applications. Studies in Big Data 2021, 107 -123.

AMA Style

Mohammed Amin Almaiah, Ali Al-Zahrani, Omar Almomani, Ahmad K. Alhwaitat. Classification of Cyber Security Threats on Mobile Devices and Applications. Studies in Big Data. 2021; ():107-123.

Chicago/Turabian Style

Mohammed Amin Almaiah; Ali Al-Zahrani; Omar Almomani; Ahmad K. Alhwaitat. 2021. "Classification of Cyber Security Threats on Mobile Devices and Applications." Studies in Big Data , no. : 107-123.

Chapter
Published: 01 May 2021 in Studies in Big Data
Reads 0
Downloads 0

Wireless sensor networks (WSNs) work in various domains such as smart cities, healthcare domains, smart buildings and transportation. These networks share sensitive data across multiple sensor nodes, smart devices and transceivers. These sensitive data in WSNs environment is susceptible to various cyber-attacks and threats. Therefore, an efficient security mechanism is needed to handle threats, attacks and security challenges in WSNs. This paper proposed a new scheme using Heuristic, Signature and voting detection methods to identify the optimal countermeasures to detect the malicious and security threats using Blockchain technology. In our scheme, the cluster head node (CN) use the three detection systems with Blockchain to detect the malicious sensor nodes. Also, CN uses important parameters such as sensor node-hash value, node-signature and voting degree for malicious to detect malicious nodes in WSNs. The overall results statistic showed that 94.9% of malicious messages were detected and identified successfully during our scheme’s simulation.

ACS Style

Mohammed Amin Almaiah. A New Scheme for Detecting Malicious Attacks in Wireless Sensor Networks Based on Blockchain Technology. Studies in Big Data 2021, 217 -234.

AMA Style

Mohammed Amin Almaiah. A New Scheme for Detecting Malicious Attacks in Wireless Sensor Networks Based on Blockchain Technology. Studies in Big Data. 2021; ():217-234.

Chicago/Turabian Style

Mohammed Amin Almaiah. 2021. "A New Scheme for Detecting Malicious Attacks in Wireless Sensor Networks Based on Blockchain Technology." Studies in Big Data , no. : 217-234.

Journal article
Published: 21 March 2021
Reads 0
Downloads 0
ACS Style

Mohammed Amin Almaiah; Ahmad Al-Khasawneh; Ahmad Althunibat; Omar Almomani. Exploring the Main Determinants of Mobile Learning Application Usage During Covid-19 Pandemic in Jordanian Universities. 2021, 348, 275 -290.

AMA Style

Mohammed Amin Almaiah, Ahmad Al-Khasawneh, Ahmad Althunibat, Omar Almomani. Exploring the Main Determinants of Mobile Learning Application Usage During Covid-19 Pandemic in Jordanian Universities. . 2021; 348 ():275-290.

Chicago/Turabian Style

Mohammed Amin Almaiah; Ahmad Al-Khasawneh; Ahmad Althunibat; Omar Almomani. 2021. "Exploring the Main Determinants of Mobile Learning Application Usage During Covid-19 Pandemic in Jordanian Universities." 348, no. : 275-290.

Journal article
Published: 21 March 2021
Reads 0
Downloads 0
ACS Style

Mohammed Amin Almaiah; Omar Almomani; Ahmad Al-Khasawneh; Ahmad Althunibat. Predicting the Acceptance of Mobile Learning Applications During COVID-19 Using Machine Learning Prediction Algorithms. 2021, 348, 319 -332.

AMA Style

Mohammed Amin Almaiah, Omar Almomani, Ahmad Al-Khasawneh, Ahmad Althunibat. Predicting the Acceptance of Mobile Learning Applications During COVID-19 Using Machine Learning Prediction Algorithms. . 2021; 348 ():319-332.

Chicago/Turabian Style

Mohammed Amin Almaiah; Omar Almomani; Ahmad Al-Khasawneh; Ahmad Althunibat. 2021. "Predicting the Acceptance of Mobile Learning Applications During COVID-19 Using Machine Learning Prediction Algorithms." 348, no. : 319-332.

Journal article
Published: 10 March 2021 in Sustainability
Reads 0
Downloads 0

Despite the fact that several studies have been conducted to study the adoption of smart-government services, little consideration has been paid to exploring the main factors that influence the adoption of smart-government services at the three main stages of smart-government services (the static, interaction, and transaction stages). Based on the results of this study, each of these three stages has different requirements in terms of system compatibility, security, information quality, awareness, perceived functional benefit, self-efficacy, perceived image, perceived uncertainty, availability of resources, and perceived trust. In addition, the results demonstrate that the requirements and perceptions of users towards the adoption and use of smart-government services in the three stages significantly differ. This study makes a unique contribution to the existing research by examining the perceptions and needs of consumers, in terms of adoption throughout the three stages.

ACS Style

Ahmad Althunibat; Muhammad Binsawad; Mohammed Almaiah; Omar Almomani; Adeeb Alsaaidah; Waleed Al-Rahmi; Mohamed Seliaman. Sustainable Applications of Smart-Government Services: A Model to Understand Smart-Government Adoption. Sustainability 2021, 13, 3028 .

AMA Style

Ahmad Althunibat, Muhammad Binsawad, Mohammed Almaiah, Omar Almomani, Adeeb Alsaaidah, Waleed Al-Rahmi, Mohamed Seliaman. Sustainable Applications of Smart-Government Services: A Model to Understand Smart-Government Adoption. Sustainability. 2021; 13 (6):3028.

Chicago/Turabian Style

Ahmad Althunibat; Muhammad Binsawad; Mohammed Almaiah; Omar Almomani; Adeeb Alsaaidah; Waleed Al-Rahmi; Mohamed Seliaman. 2021. "Sustainable Applications of Smart-Government Services: A Model to Understand Smart-Government Adoption." Sustainability 13, no. 6: 3028.

Journal article
Published: 08 February 2021 in Sustainability
Reads 0
Downloads 0

Mobile devices have become an important tool in higher education. Although mobile devices have several benefits for students, the use of these devices is still very limited among students. This low percentage of usage could be attributed to several reasons, both technical and non-technical. Therefore, there is a need to conduct more research in order to understand the necessary factors that would lead to enhanced student usage, thus achieving sustainable mobile learning. In order to achieve that, our study proposes a model by employing the unified theory of acceptance and use of technology (UTAUT) to investigate the necessary factors that influence intention to use mobile learning among university students. To evaluate the proposed model, structural equation modelling (SEM) was employed to analyze data collected from 612 students. The results indicated that factors, such as device connectivity, device compatibility, device memory, device performance, network coverage, and network speed have a significant and positive influence on students’ intention to use mobile learning. This research provides important recommendations for university decision makers and developers on understanding the necessary factors for adopting mobile learning and reflect the students’ requirements.

ACS Style

Saud Alghazi; Amirrudin Kamsin; Mohammed Almaiah; Seng Wong; Liyana Shuib. For Sustainable Application of Mobile Learning: An Extended UTAUT Model to Examine the Effect of Technical Factors on the Usage of Mobile Devices as a Learning Tool. Sustainability 2021, 13, 1856 .

AMA Style

Saud Alghazi, Amirrudin Kamsin, Mohammed Almaiah, Seng Wong, Liyana Shuib. For Sustainable Application of Mobile Learning: An Extended UTAUT Model to Examine the Effect of Technical Factors on the Usage of Mobile Devices as a Learning Tool. Sustainability. 2021; 13 (4):1856.

Chicago/Turabian Style

Saud Alghazi; Amirrudin Kamsin; Mohammed Almaiah; Seng Wong; Liyana Shuib. 2021. "For Sustainable Application of Mobile Learning: An Extended UTAUT Model to Examine the Effect of Technical Factors on the Usage of Mobile Devices as a Learning Tool." Sustainability 13, no. 4: 1856.

Journal article
Published: 04 September 2020 in IEEE Access
Reads 0
Downloads 0

This study aimed to alleviate the gap between the literature regarding the Social Networking Applications (SNAs) use for active collaboration and engagement as sustainability in higher education and task-technology-fit (TTF) and compatibility on their consequence on students’ satisfaction and their performance impact its sustainability used in higher education. Although researchers have examined (SNAs) usage within multiple situations, the roles of (TTF) and compatibility as mediating variables have not been investigated through TAM model and constructivism theory on measuring education sustainability. Overall 602 students and researchers took part in this study, which were selected from public university. Using the method of structural equation modeling (SEM), we surveyed to discover the perception of students toward the (SNAs). Based on the results, the (SNAs) use for collaboration and engagement as sustainability in higher education, and TTF and compatibility positively impacted the student’s learning performance on measuring education sustainability, and they were found to be completely pleased with the perceived ease of use and perceived usefulness. In conclusion, the role of TTF and compatibility presents positive influences performances related to sustainability for education; and both factors mediates associations among collaboration and engagement as sustainability in higher education, students' satisfaction on (SNAs) usage and students' performance related to sustainability for education. Therefore, their impact should be encouraged in learning processes in higher education institutions.

ACS Style

Mahdi M. Alamri; Mohammed Amin Almaiah; Waleed Mujahed Al-Rahmi. The Role of Compatibility and Task-Technology Fit (TTF): On Social Networking Applications (SNAs) Usage as Sustainability in Higher Education. IEEE Access 2020, 8, 161668 -161681.

AMA Style

Mahdi M. Alamri, Mohammed Amin Almaiah, Waleed Mujahed Al-Rahmi. The Role of Compatibility and Task-Technology Fit (TTF): On Social Networking Applications (SNAs) Usage as Sustainability in Higher Education. IEEE Access. 2020; 8 (99):161668-161681.

Chicago/Turabian Style

Mahdi M. Alamri; Mohammed Amin Almaiah; Waleed Mujahed Al-Rahmi. 2020. "The Role of Compatibility and Task-Technology Fit (TTF): On Social Networking Applications (SNAs) Usage as Sustainability in Higher Education." IEEE Access 8, no. 99: 161668-161681.

Journal article
Published: 31 August 2020 in IEEE Access
Reads 0
Downloads 0

Owing to the limited resources of sensor nodes, we propose an efficient hybrid routing scheme using a dynamic cluster-based static routing protocol (DCBSRP), leveraging the ad hoc on-demand distance vector (AODV) routing protocol and low-energy adaptive clustering hierarchy (LEACH) protocol. In the proposed scheme, the cluster head (CH) nodes are formed dynamically for a fixed interval, whereas static routing is applied in the designated clusters by utilizing the AODV routing protocol. The static routing condition of the proposed scheme limits all connected nodes of the cluster for a defined interval of time (T) to share their collected information through a specific CH node. Once the time (T) interval is completed, all ordinary nodes connected with the specific CH are released and they are free to advertise their CH candidateship within the network. Likewise, the node receiving the maximum number of route replies (RREPs) is selected as the next CH node in the vicinity of deployed sensor nodes. However, with the DCBSRP protocol, the recently selected CH node does not advertise its candidateship for five consecutive cycles and acts as an ordinary node. The simulation result shows significant improvement in the lifetime and participation of ordinary nodes in the network until the end-stage of the network. In the proposed scheme, the participation of ordinary nodes in the network is 95.9 %, which not only balances load between participating nodes but also improves the network lifetime in the presence of field-proven schemes. Moreover, the simulation results show an out-performance of rival schemes in terms of communication cost, end to end delay, throughput, packet lost ratio, and energy consumption.

ACS Style

Muhammad Adil; Rahim Khan; Jehad Ali; Byeong-Hee Roh; Qui Thanh Hoai Ta; Mohammed Amin Almaiah. An Energy Proficient Load Balancing Routing Scheme for Wireless Sensor Networks to Maximize Their Lifespan in an Operational Environment. IEEE Access 2020, 8, 163209 -163224.

AMA Style

Muhammad Adil, Rahim Khan, Jehad Ali, Byeong-Hee Roh, Qui Thanh Hoai Ta, Mohammed Amin Almaiah. An Energy Proficient Load Balancing Routing Scheme for Wireless Sensor Networks to Maximize Their Lifespan in an Operational Environment. IEEE Access. 2020; 8 (99):163209-163224.

Chicago/Turabian Style

Muhammad Adil; Rahim Khan; Jehad Ali; Byeong-Hee Roh; Qui Thanh Hoai Ta; Mohammed Amin Almaiah. 2020. "An Energy Proficient Load Balancing Routing Scheme for Wireless Sensor Networks to Maximize Their Lifespan in an Operational Environment." IEEE Access 8, no. 99: 163209-163224.

Journal article
Published: 11 August 2020 in Sustainability
Reads 0
Downloads 0

Nowadays, social media applications (SMAs) which are quite popular among students have a significant influence on education sustainability. However, there is a lack of research that explores elements of the constructivist learning approach with the technology acceptance model (TAM) in higher education. Therefore, this research aimed to minimize the literature gap by examining the SMA factors used for active collaborative learning (ACL) and engagement (EN) to affect the students’ academic performance in measuring education sustainability, as well as examining their satisfaction from its use. This study employed constructivism theory and TAM as the investigation model, and applied a quantitative method and analysis through surveying 192 university students at King Faisal University. Using structural equation modeling (SEM), the responses were sorted into nine factors and analyzed to explain students’ academic performance in measuring education sustainability, as well as their satisfaction. The results were analyzed with structural equation modelling; it was shown that all the hypotheses were supported and positively related to sustainability for education, confirming significant relationships between the use of SMAs and the rest of the variables considered in our model (interactivity with peers (IN-P), interactivity with lecturers (IN-L), ACL, EN, perceived ease of use (PEOU), perceived usefulness (PU), SMA use, student satisfaction (SS), and students’ academic performance (SAP).

ACS Style

Mahdi Alamri; Mohammed Almaiah; Waleed Al-Rahmi. Social Media Applications Affecting Students’ Academic Performance: A Model Developed for Sustainability in Higher Education. Sustainability 2020, 12, 6471 .

AMA Style

Mahdi Alamri, Mohammed Almaiah, Waleed Al-Rahmi. Social Media Applications Affecting Students’ Academic Performance: A Model Developed for Sustainability in Higher Education. Sustainability. 2020; 12 (16):6471.

Chicago/Turabian Style

Mahdi Alamri; Mohammed Almaiah; Waleed Al-Rahmi. 2020. "Social Media Applications Affecting Students’ Academic Performance: A Model Developed for Sustainability in Higher Education." Sustainability 12, no. 16: 6471.

Journal article
Published: 11 August 2020 in IEEE Access
Reads 0
Downloads 0

Resource limited networks have various applications in our daily life. However, a challenging issue associated with these networks is a uniform load balancing strategy to prolong their lifespan. In literature, various schemes try to improve the scalability and reliability of the networks, but majority of these approaches assume homogeneous networks. Moreover, most of the technique uses distance, residual energy and hop count values to balance the energy consumption of participating nodes and prolong the network lifetime. Therefore, an energy efficient load balancing scheme for heterogeneous wireless sensor networks (WSNs) need to be developed. In this paper, an energy gauge node (EGN) based communication infrastructure is presented to develop a uniform load balancing strategy for resource-limited networks. EGN measures the residual energy of the participating nodes i.e., Ci 2 Network. Moreover, EGN nodes advertise hop selection information in the network which is used by ordinary nodes to update their routing tables. Likewise, ordinary nodes use this information to uni-cast its collected data to the destination. EGN nodes work on built-in configuration to categorize their neighboring nodes such as powerful, normal and critical energy categories. EGN uses the strength of packet reply (SPR) and round trip time (RTT) values to measure the neighboring node’s residual energy (Er) and those node(s) which have a maximum Er values are advertised as reliable paths for communication. Furthermore, EGN transmits a route request (RREQ) in the network and receives route reply (RREP) from every node reside in its closed proximity which is used to compute the Er energy values of the neighboring node(s). If Er value of a neighboring node is less than the defined category threshold value then this node is advertised as non-available for communication as a relaying node. The simulation results show that our proposed scheme surpasses the existing schemes in terms of lifespan of individual nodes, throughput, packet loss ratio (PLR), latency, communication costs and computation costs, etc,. Moreover, our proposed scheme prolongs the lifespan of WSNs and as well as an individual node against exiting schemes in the operational environment.

ACS Style

Muhammad Adil; Rahim Khan; Mohammed Amin Almaiah; Muhammad Bin Sawad; Jehad Ali; Adeeb Al Saaidah; Qui Thanh Hoai Ta. An Efficient Load Balancing Scheme of Energy Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks. IEEE Access 2020, 8, 148510 -148527.

AMA Style

Muhammad Adil, Rahim Khan, Mohammed Amin Almaiah, Muhammad Bin Sawad, Jehad Ali, Adeeb Al Saaidah, Qui Thanh Hoai Ta. An Efficient Load Balancing Scheme of Energy Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks. IEEE Access. 2020; 8 (99):148510-148527.

Chicago/Turabian Style

Muhammad Adil; Rahim Khan; Mohammed Amin Almaiah; Muhammad Bin Sawad; Jehad Ali; Adeeb Al Saaidah; Qui Thanh Hoai Ta. 2020. "An Efficient Load Balancing Scheme of Energy Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks." IEEE Access 8, no. 99: 148510-148527.

Article
Published: 22 May 2020 in Education and Information Technologies
Reads 0
Downloads 0

The provision and usage of online and e-learning system is becoming the main challenge for many universities during COVID-19 pandemic. E-learning system such as Blackboard has several fantastic features that would be valuable for use during this COVID-19 pandemic. However, the successful usage of e-learning system relies on understanding the adoption factors as well as the main challenges that face the current e-learning systems. There is lack of agreement about the critical challenges and factors that shape the successful usage of e-learning system during COVID-19 pandemic; hence, a clear gap has been identified in the knowledge on the critical challenges and factors of e-learning usage during this pandemic. Therefore, this study aims to explore the critical challenges that face the current e-learning systems and investigate the main factors that support the usage of e-learning system during COVID-19 pandemic. This study employed the interview method using thematic analysis through NVivo software. The interview was conducted with 30 students and 31 experts in e-learning systems at six universities from Jordan and Saudi Arabia. The findings of this study offer useful suggestions for policy-makers, designers, developers and researchers, which will enable them to get better acquainted with the key aspects of the e-learning system usage successfully during COVID-19 pandemic.

ACS Style

Mohammed Amin Almaiah; Ahmad Al-Khasawneh; Ahmad Althunibat. Exploring the critical challenges and factors influencing the E-learning system usage during COVID-19 pandemic. Education and Information Technologies 2020, 25, 5261 -5280.

AMA Style

Mohammed Amin Almaiah, Ahmad Al-Khasawneh, Ahmad Althunibat. Exploring the critical challenges and factors influencing the E-learning system usage during COVID-19 pandemic. Education and Information Technologies. 2020; 25 (6):5261-5280.

Chicago/Turabian Style

Mohammed Amin Almaiah; Ahmad Al-Khasawneh; Ahmad Althunibat. 2020. "Exploring the critical challenges and factors influencing the E-learning system usage during COVID-19 pandemic." Education and Information Technologies 25, no. 6: 5261-5280.

Journal article
Published: 18 April 2020 in Sensors
Reads 0
Downloads 0

Wireless Sensor Networks (WSNs) are vulnerable to various security threats. One of the most common types of vulnerability threat is the jamming attack, where the attacker uses the same frequency signals to jam the network transmission. In this paper, an edge node scheme is proposed to address the issue of jamming attack in WSNs. Three edge nodes are used in the deployed area of WSN, which have different transmission frequencies in the same bandwidth. The different transmission frequencies and Round Trip Time (RTT) of transmitting signal makes it possible to identify the jamming attack channel in WSNs transmission media. If an attacker jams one of the transmission channels, then the other two edge nodes verify the media serviceability by means of transmitting information from the same deployed WSNs. Furthermore, the RTT of the adjacent channel is also disturbed from its defined interval of time, due to high frequency interference in the adjacent channels, which is the indication of a jamming attack in the network. The simulation result was found to be quite consistent during analysis by jamming the frequency channel of each edge node in a step-wise process. The detection rate of jamming attacks was about 94% for our proposed model, which was far better than existing schemes. Moreover, statistical analyses were undertaken for field-proven schemes, and were found to be quite convincing compared with the existing schemes, with an average of 6% improvement.

ACS Style

Muhammad Adil; Mohammed Amin Almaiah; Alhuseen Omar Alsayed; Omar Almomani. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks. Sensors 2020, 20, 2311 .

AMA Style

Muhammad Adil, Mohammed Amin Almaiah, Alhuseen Omar Alsayed, Omar Almomani. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks. Sensors. 2020; 20 (8):2311.

Chicago/Turabian Style

Muhammad Adil; Mohammed Amin Almaiah; Alhuseen Omar Alsayed; Omar Almomani. 2020. "An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks." Sensors 20, no. 8: 2311.

Journal article
Published: 04 March 2020 in IEEE Access
Reads 0
Downloads 0

Wireless sensor networks (WSNs) is an infrastructure free organization of various operational devices. Due to their overwhelming characteristics, these networks are used in different applications. For WSNs, it is necessary to collect real time and precise data as critical decisions are based on these readings in different application scenarios. In WSNs, authentication of the operational devices is one the challenge issue to the research community as these networks are dynamic and self-organizing in nature. Moreover, due to the constraint oriented nature of these devices a generalized light-weight authentication scheme is needed to be developed. In this paper, a light-weight anonymous authentication techniques is presented to resolve the black-hole attack issue associated with WSNs. In this scheme, Medium Access Control (Mac) address is used to register every node in WSNs with its nearest cluster head(CH) or base station module(s). The registration process is performed in an off-line phase to ensure authenticity of both legitimate nodes and base stations in an operational network. The proposed technique resolves the black-hole attack issue as an intruder node needs to be registered with both gateway and neighbouring nodes which is not possible. Moreover, a hybrid data encryption scheme, elliptic curve integrated encryption standard (ECIES) and elliptic curve deffi-hellman problem (ECDDHP), is used to improve authenticity, confidentiality and integrity of the collected data. Simulation results show the exceptional performance of the proposed scheme against field proven techniques in terms of minimum possible end-to-end delay & communication cost, maximum average packet delivery ratio and throughput in presence of malicious node(s).

ACS Style

Muhammad Adil; Rahim Khan; Mohammed Amin Almaiah; Mohammed Al-Zahrani; Muhammad Zakarya; Muhammad Saeed Amjad; Rehan Ahmed. MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks. IEEE Access 2020, 8, 44459 -44469.

AMA Style

Muhammad Adil, Rahim Khan, Mohammed Amin Almaiah, Mohammed Al-Zahrani, Muhammad Zakarya, Muhammad Saeed Amjad, Rehan Ahmed. MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks. IEEE Access. 2020; 8 (99):44459-44469.

Chicago/Turabian Style

Muhammad Adil; Rahim Khan; Mohammed Amin Almaiah; Mohammed Al-Zahrani; Muhammad Zakarya; Muhammad Saeed Amjad; Rehan Ahmed. 2020. "MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks." IEEE Access 8, no. 99: 44459-44469.

Journal article
Published: 28 February 2020 in International Journal of Interactive Mobile Technologies (iJIM)
Reads 0
Downloads 0

This research examines the mobile-government services adoption, by combining both UTAUT and GAM models with adding new constructs for explaining the key factors that affect on adoption of mobile-government services. As a result, the study identified the critical factors that influence users’ to adopt the system, and developed an integrated model as a powerful tool that assists in the adoption process of mobile-government applications. The novelty of this research will be an added value to the body of knowledge and its implications will be vital for researchers and decision/policy makers who are willing to make a change.

ACS Style

Moahmmed Amin Almaiah; Ahmad Al-Khasawneh; Ahmad Althunibat; Saleh Khawatreh. Mobile Government Adoption Model Based on Combining GAM and UTAUT to Explain Factors According to Adoption of Mobile Government Services. International Journal of Interactive Mobile Technologies (iJIM) 2020, 14, 199 -225.

AMA Style

Moahmmed Amin Almaiah, Ahmad Al-Khasawneh, Ahmad Althunibat, Saleh Khawatreh. Mobile Government Adoption Model Based on Combining GAM and UTAUT to Explain Factors According to Adoption of Mobile Government Services. International Journal of Interactive Mobile Technologies (iJIM). 2020; 14 (3):199-225.

Chicago/Turabian Style

Moahmmed Amin Almaiah; Ahmad Al-Khasawneh; Ahmad Althunibat; Saleh Khawatreh. 2020. "Mobile Government Adoption Model Based on Combining GAM and UTAUT to Explain Factors According to Adoption of Mobile Government Services." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 3: 199-225.

Journal article
Published: 15 February 2020 in International Journal of Advanced Trends in Computer Science and Engineering
Reads 0
Downloads 0
ACS Style

Mohammed Almaiah. Thematic Analysis for Classifying the Main Challenges and Factors Influencing the Successful Implementation of E-learning System Using NVivo. International Journal of Advanced Trends in Computer Science and Engineering 2020, 9, 142 -152.

AMA Style

Mohammed Almaiah. Thematic Analysis for Classifying the Main Challenges and Factors Influencing the Successful Implementation of E-learning System Using NVivo. International Journal of Advanced Trends in Computer Science and Engineering. 2020; 9 (1):142-152.

Chicago/Turabian Style

Mohammed Almaiah. 2020. "Thematic Analysis for Classifying the Main Challenges and Factors Influencing the Successful Implementation of E-learning System Using NVivo." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 1: 142-152.

Journal article
Published: 15 February 2020 in International Journal of Advanced Trends in Computer Science and Engineering
Reads 0
Downloads 0
ACS Style

Mohammed Almaiah. Multilayer Neural Network based on MIMO and Channel Estimation for Impulsive Noise Environment in Mobile Wireless Networks. International Journal of Advanced Trends in Computer Science and Engineering 2020, 9, 315 -321.

AMA Style

Mohammed Almaiah. Multilayer Neural Network based on MIMO and Channel Estimation for Impulsive Noise Environment in Mobile Wireless Networks. International Journal of Advanced Trends in Computer Science and Engineering. 2020; 9 (1):315-321.

Chicago/Turabian Style

Mohammed Almaiah. 2020. "Multilayer Neural Network based on MIMO and Channel Estimation for Impulsive Noise Environment in Mobile Wireless Networks." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 1: 315-321.

Article
Published: 24 January 2020 in Education and Information Technologies
Reads 0
Downloads 0

The adoption of mobile cloud computing technology is still at an early stage of implementation in the university campus. This research aims to fill this gap by investigating the main factors that influence on the decision to adopt mobile cloud computing in the university campus. Therefore, this research proposes an integrated model, incorporating seven key technological factors derived from previous research review, along with new factors (such as quality of service and relative advantage) that have not been addressed in the previous researches as key aspects in the decision to adopt mobile cloud services in university campus. Data were collected from 210 academic staff in different departments in the public universities in Saudi Arabia. The most influential determinants of mobile cloud adoption were found to be quality of service, perceived usefulness, perceived ease of use, relative advantage and trust. The results also showed security and privacy concerns still prevent mobile cloud adoption in Saudi universities. Finally, findings of this research provide valuable guidelines to universities, mobile cloud providers and decision makers to ensure a successful implementation of mobile cloud computing technology.

ACS Style

Mohammed Amin Almaiah; Ahmad Al-Khasawneh. Investigating the main determinants of mobile cloud computing adoption in university campus. Education and Information Technologies 2020, 25, 3087 -3107.

AMA Style

Mohammed Amin Almaiah, Ahmad Al-Khasawneh. Investigating the main determinants of mobile cloud computing adoption in university campus. Education and Information Technologies. 2020; 25 (4):3087-3107.

Chicago/Turabian Style

Mohammed Amin Almaiah; Ahmad Al-Khasawneh. 2020. "Investigating the main determinants of mobile cloud computing adoption in university campus." Education and Information Technologies 25, no. 4: 3087-3107.

Journal article
Published: 01 January 2020 in Electronic Government, an International Journal
Reads 0
Downloads 0

International publishers of academic, scientific and professional journals since 1979.

ACS Style

Mohammed Almaiah; Yacoub Nasereddin. Factors Influencing the Adoption of E-government Services among Jordanian Citizens. Electronic Government, an International Journal 2020, 16, 1 .

AMA Style

Mohammed Almaiah, Yacoub Nasereddin. Factors Influencing the Adoption of E-government Services among Jordanian Citizens. Electronic Government, an International Journal. 2020; 16 (1):1.

Chicago/Turabian Style

Mohammed Almaiah; Yacoub Nasereddin. 2020. "Factors Influencing the Adoption of E-government Services among Jordanian Citizens." Electronic Government, an International Journal 16, no. 1: 1.

Journal article
Published: 31 December 2019 in IEEE Access
Reads 0
Downloads 0

For the development effective and successful mobile learning applications, it is important to understand the users’ requirements in different stages of usage. In this paper, we developed a new model to study the effect of different factors on mobile learning applications development at the three main stages of usage (static stage, interaction stage and transaction stage). The results of this study showed that each stage of the three stages, static, interaction, and transaction has different requirements in terms of system compatibility, security, information quality, awareness, perceived functional benefit, self-efficacy, perceived image, perceived uncertainty, availability of resources, and perceived trust. In addition, the results demonstrated that the requirements and perceptions of users towards the adoption and use of mobile learning application in the three stages significantly differ. The novelty of this research will be an added value to the body of knowledge and its implications will be vital for researchers and designers who are developing mobile learning applications.

ACS Style

Moahmmed Amin Almaiah; Mahdi M. Alamri; Waleed Mugahed Al-Rahmi. Analysis the Effect of Different Factors on the Development of Mobile Learning Applications at Different Stages of Usage. IEEE Access 2019, 8, 16139 -16154.

AMA Style

Moahmmed Amin Almaiah, Mahdi M. Alamri, Waleed Mugahed Al-Rahmi. Analysis the Effect of Different Factors on the Development of Mobile Learning Applications at Different Stages of Usage. IEEE Access. 2019; 8 (99):16139-16154.

Chicago/Turabian Style

Moahmmed Amin Almaiah; Mahdi M. Alamri; Waleed Mugahed Al-Rahmi. 2019. "Analysis the Effect of Different Factors on the Development of Mobile Learning Applications at Different Stages of Usage." IEEE Access 8, no. 99: 16139-16154.

Journal article
Published: 02 December 2019 in IEEE Access
Reads 0
Downloads 0
ACS Style

Mohammed Amin Almaiah; Mahdi M. Alamri; Waleed Al-Rahmi. Applying the UTAUT Model to Explain the Students’ Acceptance of Mobile Learning System in Higher Education. IEEE Access 2019, 7, 174673 -174686.

AMA Style

Mohammed Amin Almaiah, Mahdi M. Alamri, Waleed Al-Rahmi. Applying the UTAUT Model to Explain the Students’ Acceptance of Mobile Learning System in Higher Education. IEEE Access. 2019; 7 ():174673-174686.

Chicago/Turabian Style

Mohammed Amin Almaiah; Mahdi M. Alamri; Waleed Al-Rahmi. 2019. "Applying the UTAUT Model to Explain the Students’ Acceptance of Mobile Learning System in Higher Education." IEEE Access 7, no. : 174673-174686.