Mohammed Alwakeel |
A general 3-D non-stationary 5G wireless channel model |
IEEE Transactions on Communications 66 (7), 3065-3078, 2017 |
2017 |
Engineering |
Mohammed Alwakeel |
A non-stationary 3-D wideband twin-cluster model for 5G massive MIMO channels |
IEEE journal on selected areas in communications 32 (6), 1207-1218, 2014 |
2014 |
Engineering |
Mohammed Alwakeel |
A non-stationary wideband channel model for massive MIMO communication systems |
IEEE transactions on wireless communications 14 (3), 1434-1446, 2014 |
2014 |
Engineering |
Mohammed Alwakeel |
3D wideband non-stationary geometry-based stochastic models for non-isotropic MIMO vehicle-to-vehicle channels |
IEEE Transactions on Wireless Communications 14 (12), 6883-6895, 2015 |
2015 |
Engineering |
Mohammed Alwakeel |
Spectral, energy, and economic efficiency of 5G multicell massive MIMO systems with generalized spatial modulation |
IEEE Transactions on Vehicular Technology 65 (12), 9715-9731, 2016 |
2016 |
Engineering |
Mohammed Alwakeel |
Performance analysis of space shift keying with amplify and forward relaying |
IEEE Communications Letters 15 (12), 1350-1352, 2011 |
2011 |
Engineering |
Mohammed Alwakeel |
Performance analysis of multi-hop amplify-and-forward relaying systems in Rayleigh fading channels with a Poisson interference field |
IEEE Transactions on wireless communications 13 (1), 24-35, 2013 |
2013 |
Engineering |
Mohammed Alwakeel |
Energy detection of unknown signals in Gamma‐shadowed Rician fading environments with diversity reception |
IET communications 9 (2), 196-210, 2015 |
2015 |
Engineering |
Mohammed Alwakeel |
BER performance of spatial modulation systems under 3-D V2V MIMO channel models |
IEEE transactions on vehicular technology 65 (7), 5725-5730, 2015 |
2015 |
Engineering |
Mohammed Alwakeel |
A machine learning based WSN system for autism activity recognition |
2015 IEEE 14th International Conference on Machine Learning and Applications …, 2015 |
2015 |
Engineering |
Mohammed Alwakeel |
A novel Kronecker-based stochastic model for massive MIMO channels |
2015 IEEE/CIC International Conference on Communications in China (ICCC), 1-6, 2015 |
2015 |
Engineering |
Mohammed Alwakeel |
Performance investigation of spatial modulation systems under non-stationary wideband high-speed train channel models |
IEEE Transactions on Wireless Communications 15 (9), 6163-6174, 2016 |
2016 |
Engineering |
Mohammed Alwakeel |
Quadrature space-frequency index modulation for energy-efficient 5G wireless communication systems |
IEEE transactions on communications 66 (7), 3050-3064, 2017 |
2017 |
Engineering |
Mohammed Alwakeel |
Evaluation of average bit error rate for wireless networks with alpha‐stable interference |
Electronics letters 50 (1), 47-49, 2014 |
2014 |
Engineering |
Mohammed Alwakeel |
Analysis of beaconing message rate in VANET multi-hop broadcast protocols |
High Capacity Optical Networks and Emerging/Enabling Technologies, 037-041, 2012 |
2012 |
Engineering |
Mohammed Alwakeel |
On the performance of dual-hop space shift keying with single amplify-and-forward relay |
2012 IEEE wireless communications and networking conference (WCNC), 776-780, 2012 |
2012 |
Engineering |
Mohammed Alwakeel |
Performance of CA-CFAR receivers in alpha-stable clutter |
IEEE International Symposium on Signal Processing and Information Technology …, 2013 |
2013 |
Engineering |
Mohammed Alwakeel |
On the performance analysis of energy detection of unknown signals in Gamma shadowed Ricean fading environments |
2013 IEEE 24th Annual International Symposium on Personal, Indoor, and …, 2013 |
2013 |
Engineering |
Mohammed Alwakeel |
Security protocol architecture for website authentications and content integrity |
2013 World Congress on Computer and Information Technology (WCCIT), 1-6, 2013 |
2013 |
Engineering |
Mohammed Alwakeel |
Adapting statistical multi-hop wireless broadcast protocol decision thresholds using rate control |
High Capacity Optical Networks and Emerging/Enabling Technologies, 032-036, 2012 |
2012 |
Engineering |
Mohammed Alwakeel |
Performance Evaluation of Service and Power Based Handover Algorithm in Multi Radio Access Technologies |
2013 1st International Conference on Artificial Intelligence, Modelling and …, 2013 |
2013 |
Engineering |
Mohammed Alwakeel |
Approximating handoff number and handoff rate in cellular networks with arbitrary call holding time and cell residence time distributions |
2009 2nd IEEE International Conference on Computer Science and Information …, 2009 |
2009 |
Engineering |
Mohammed Alwakeel |
A novel method for ergodic sum rate analysis of spatial modulation systems with maximum likelihood receiver |
2015 International Wireless Communications and Mobile Computing Conference …, 2015 |
2015 |
Engineering |
Mohammed Alwakeel |
Performance analysis of multi-hop AF relaying systems with a Poisson field of interferers in Nakagami-m fading channels |
2013 IEEE 78th Vehicular Technology Conference (VTC Fall), 1-5, 2013 |
2013 |
Engineering |
Mohammed Alwakeel |
Perspectives on system of systems for pilgrimage ritual guidance and management |
2014 IEEE International Systems Conference Proceedings, 425-430, 2014 |
2014 |
Engineering |
Mohammed Alwakeel |
Effect of interference on multihop amplify-and-forward relay systems operating in Rayleigh fading |
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio …, 2012 |
2012 |
Engineering |
Mohammed Alwakeel |
Common Mental Disorders in Smart City Settings and use of Multimodal Medical Sensor Fusion to Detect Them |
Diagnostics, 2023 |
2023 |
Engineering |
Mohammed Alwakeel |
FADS: An Intelligent Fatigue and Age Detection System |
Mathematics, 2023 |
2023 |
Engineering |
Mohammed Alwakeel |
Intelligent Image Super-Resolution for Vehicle License Plate in Surveillance Applications |
Mathematics, 2023 |
2023 |
Engineering |
Mohammed Alwakeel |
Performance Evaluation of Different Decision Fusion Approaches for Image Classification |
Applied Sciences 13 (2), 1168, 2023 |
2023 |
Engineering |
Mohammed Alwakeel |
Cloud Servers: Resource Optimization Using Different Energy Saving Techniques |
Sensors, 2022 |
2022 |
Engineering |
Mohammed Alwakeel |
A Symbols based BCI paradigm for Intelligent Home Control using P300 Event-Related Potentials |
Sensors (ISSN 1424-8220, 2022 |
2022 |
Engineering |
Mohammed Alwakeel |
Analysis of LTE Multiuser Flat Downlink Power Spectrum with Multi-Antenna System Simulation |
2013 UKSim 15th International Conference on Computer Modelling and …, 2013 |
2013 |
Engineering |
Osama Moh'd Alia |
Maximizing wireless sensor network coverage with minimum cost using harmony search algorithm |
IEEE Sensors Journal 17 (3), 882-896, 2016 |
2016 |
Computer science |
Osama Moh'd Alia |
Dynamic relocation of mobile base station in wireless sensor networks using a cluster-based harmony search algorithm |
Information Sciences 385, 76-95, 2017 |
2017 |
Computer science |
Osama Moh'd Alia |
A decentralized fuzzy C-means-based energy-efficient routing protocol for wireless sensor networks |
The Scientific World Journal 2014, 2014 |
2014 |
Computer science |
Osama Moh'd Alia |
Data clustering using harmony search algorithm |
International Conference on Swarm, Evolutionary, and Memetic Computing, 79-88, 2011 |
2011 |
Computer science |
Osama Moh'd Alia |
A dynamic harmony search-based fuzzy clustering protocol for energy-efficient wireless sensor networks |
Annals of Telecommunications 73 (5-6), 353–365, 2018 |
2018 |
Computer science |
Osama Moh'd Alia |
Incorporating prediction factor into the investigation capability in the social force model: application on avoiding grouped pedestrians |
Applied Mathematics & Information Sciences 7 (1), 323-331, 2013 |
2013 |
Computer science |
Osama Moh'd Alia |
Musicians'-inspired clustering protocol for efficient energy Wireless Sensor Networks |
Fourth International Conference on Communications and Networking, ComNet …, 2014 |
2014 |
Computer science |
Osama Moh'd Alia |
A harmony search algorithm for the reproduction of experimental data in the social force model |
Journal of Applied Mathematics 2014, 2014 |
2014 |
Computer science |
Osama Moh'd Alia |
A Semantic Classification Approach for Indoor Robot Navigation |
Electronics 11 (13), 2063, 2022 |
2022 |
Computer science |
Osama Moh'd Alia |
P-HS-SFM: a parallel harmony search algorithm for the reproduction of experimental data in the continuous microscopic crowd dynamic models |
Journal of Experimental & Theoretical Artificial Intelligence 30 (2), 235-255, 2018 |
2018 |
Computer science |
Osama Moh'd Alia |
Automatic Initialization Of Level Set Methods In Discontinuity Regions Of Liver In CT Scans |
Current Medical Imaging Reviews 14 (3), 444 - 453, 2018 |
2018 |
Computer science |
Zaid Bassfar |
Construction of a software development model for managing final year projects in information technology programmes |
International Journal of Emerging Technologies in Learning (iJET) 15 (21), 4-23, 2020 |
2020 |
Information technology |
Zaid Bassfar |
A SLAM-based localization and navigation system for social robots: The pepper robot case |
Machines 11 (2), 158, 2023 |
2023 |
Information technology |
Zaid Bassfar |
Finger-Gesture Controlled Wheelchair with Enabling IoT |
Sensors 22 (22), 8716, 2022 |
2022 |
Information technology |
Zaid Bassfar |
Local fractional strong metric dimension of certain rotationally symmetric planer networks |
IEEE Access 9, 159326-159333, 2021 |
2021 |
Information technology |
Zaid Bassfar |
Mordell Elliptic Curve Based Design of Nonlinear Component of Block Cipher |
CMC-COMPUTERS MATERIALS & CONTINUA 73 (2), 2913-2930, 2022 |
2022 |
Information technology |
Saad Almutairi |
Effective attack detection in internet of medical things smart environment using a deep belief neural network |
IEEE Access 8, 77396-77404, 2020 |
2020 |
Computer science |
Saad Almutairi |
Adaptive context aware decision computing paradigm for intensive health care delivery in smart cities—A case analysis |
Sustainable cities and society 41, 919-924, 2018 |
2018 |
Computer science |
Saad Almutairi |
A new secure transmission scheme between senders and receivers using HVCHC without any loss |
EURASIP Journal on Wireless Communications and Networking 2019, 1-15, 2019 |
2019 |
Computer science |
Saad Almutairi |
Review of advanced computational approaches on multiple sclerosis segmentation and classification |
IET Signal Processing 14 (6), 333-341, 2020 |
2020 |
Computer science |
Saad Almutairi |
The clandestine image transmission scheme to prevent from the intruders |
International Journal of Advanced and Applied Sciences 4 (2), 52-60, 2017 |
2017 |
Computer science |
Saad Almutairi |
Two-stage classification model for the prediction of heart disease using IoMT and artificial intelligence |
Sensors 22 (2), 476, 2022 |
2022 |
Computer science |
Saad Almutairi |
A user-based video recommendation approach using CAC filtering, PCA with LDOS-CoMoDa |
The Journal of Supercomputing, 1-15, 2022 |
2022 |
Computer science |
Saad Almutairi |
Implementing Integrity Assurance System for Big Data |
Wireless Personal Communications 122 (3), 2585-2601, 2022 |
2022 |
Computer science |
Saad Almutairi |
Non-divergent traffic management scheme using classification learning for smart transportation systems |
Computers and Electrical Engineering 106, 108581, 2023 |
2023 |
Computer science |
Saad Almutairi |
An Efficient USE-Net Deep Learning Model for Cancer Detection |
International Journal of Intelligent Systems 2023, 2023 |
2023 |
Computer science |
Saad Almutairi |
A Context-Aware MRIPPER Algorithm for Heart Disease Prediction |
Journal of Healthcare Engineering 2022, 2022 |
2022 |
Computer science |
Saad Almutairi |
An enhancement on class diagram to model a secure context aware system |
2017 International Conference on Innovations in Green Energy and Healthcare …, 2017 |
2017 |
Computer science |
Tareq Alhmiedat |
Social distance monitoring approach using wearable smart tags |
Electronics 10 (19), 2435, 2021 |
2021 |
Information technology |
Tareq Alhmiedat |
Low-power environmental monitoring system for ZigBee wireless sensor network |
KSII Transactions on Internet and Information Systems (TIIS) 11 (10), 4781-4803, 2017 |
2017 |
Information technology |
Tareq Alhmiedat |
An adaptive indoor positioning algorithm for ZigBee WSN |
Fifth International Conference on the Innovative Computing Technology …, 2015 |
2015 |
Information technology |
Tareq Alhmiedat |
An adaptive energy-efficient data collection system for ZigBee wireless sensor networks |
International Journal of Distributed Sensor Networks 11 (12), 734937, 2015 |
2015 |
Information technology |
Tareq Alhmiedat |
A hybrid tracking system for zigbee wsns |
2014 6th International Conference on Computer Science and Information …, 2014 |
2014 |
Information technology |
Tareq Alhmiedat |
Efficacy of Emerging Technologies to Manage Childhood Obesity |
Diabetes, Metabolic Syndrome and Obesity: Targets and Therapy, 1227-1244, 2022 |
2022 |
Information technology |
Tareq Alhmiedat |
Novel fuzzy controller for a standalone electric vehicle charging station supplied by photovoltaic energy |
Applied System Innovation 4 (3), 63, 2021 |
2021 |
Information technology |
Tareq Alhmiedat |
A Semantic Classification Approach for Indoor Robot Navigation |
Electronics 11 (13), 2063, 2022 |
2022 |
Information technology |
Tareq Alhmiedat |
Performance improvement of H8 transformerless grid-tied inverter using model predictive control considering a weak grid |
Processes 10 (7), 1243, 2022 |
2022 |
Information technology |
Tareq Alhmiedat |
A SLAM-based localization and navigation system for social robots: The pepper robot case |
Machines 11 (2), 158, 2023 |
2023 |
Information technology |
Tareq Alhmiedat |
Design and Evaluation of a Personal Robot Playing a Self-Management for Children with Obesity |
Electronics 11 (23), 4000, 2022 |
2022 |
Information technology |
Tareq Alhmiedat |
Finger-Gesture Controlled Wheelchair with Enabling IoT |
Sensors 22 (22), 8716, 2022 |
2022 |
Information technology |
Tareq Alhmiedat |
Revolutionizing Social Robotics: A Cloud-Based Framework for Enhancing the Intelligence and Autonomy of Social Robots |
Robotics 12 (2), 48, 2023 |
2023 |
Information technology |
Tareq Alhmiedat |
Employing Social Robots for Managing Diabetes Among Children: SARA |
Wireless Personal Communications, 1-20, 2023 |
2023 |
Information technology |
Tareq Alhmiedat |
Fingerprint-Based Localization Approach for WSN Using Machine Learning Models |
Applied Sciences 13 (5), 3037, 2023 |
2023 |
Information technology |
Tareq Alhmiedat |
An Autonomous Maze-Solving Robotic System Based on an Enhanced Wall-Follower Approach |
Machines 11 (2), 249, 2023 |
2023 |
Information technology |
Tareq Alhmiedat |
Early Wildfire Smoke Detection Using Different YOLO Models |
Machines 11 (2), 246, 2023 |
2023 |
Information technology |
Tareq Alhmiedat |
A Systematic Approach for Exploring Underground Environment Using LiDAR-Based System |
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023 |
2023 |
Information technology |
Abdelrahman osman Elfaki |
Mapping ERD to knowledge graph |
2019 IEEE World Congress on Services (SERVICES) 2642, 110-114, 2019 |
2019 |
Information technology |
Abdelrahman osman Elfaki |
Formalizing over design and under design of value engineering for context-aware cloud service development |
2015 3rd International Conference on Future Internet of Things and Cloud, 72-79, 2015 |
2015 |
Information technology |
Abdelrahman osman Elfaki |
Construction of a software development model for managing final year projects in information technology programmes |
International Journal of Emerging Technologies in Learning (iJET) 15 (21), 4-23, 2020 |
2020 |
Information technology |
Abdelrahman osman Elfaki |
A real time Arabic sign language alphabets (ArSLA) recognition model using deep learning architecture |
Computers 11 (5), 78, 2022 |
2022 |
Information technology |
Abdelrahman osman Elfaki |
A SLAM-based localization and navigation system for social robots: The pepper robot case |
Machines 11 (2), 158, 2023 |
2023 |
Information technology |
Abdelrahman osman Elfaki |
Variability based Approach for Minimizing over Design and under Design |
MATEC Web of Conferences 54, 07002, 2016 |
2016 |
Information technology |
Abdelrahman osman Elfaki |
Revolutionizing Social Robotics: A Cloud-Based Framework for Enhancing the Intelligence and Autonomy of Social Robots |
Robotics 12 (2), 48, 2023 |
2023 |
Information technology |
Abdelrahman osman Elfaki |
Systematic Approach for Measuring Semantic Relatedness between Ontologies |
Electronics 12 (6), 1394, 2023 |
2023 |
Information technology |
Abdelrahman osman Elfaki |
A Systematic Approach for Exploring Underground Environment Using LiDAR-Based System |
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023 |
2023 |
Information technology |
Abdelrahman osman Elfaki |
Analytic hierarchy process as integrated criteria for evaluating students of the bridging program |
Journal of Computers in Education 3, 439-452, 2016 |
2016 |
Information technology |
Abdulaziz Almehmadi |
A survey of privacy enhancing technologies for smart cities |
Pervasive and Mobile Computing 55, 76-95, 2019 |
2019 |
Information technology |
Abdulaziz Almehmadi |
Cooperative localization improvement using distance information in vehicular ad hoc networks |
Sensors 19 (23), 5231, 2019 |
2019 |
Information technology |
Abdulaziz Almehmadi |
Micromovement behavior as an intention detection measurement for preventing insider threats |
IEEE Access 6, 40626-40637, 2018 |
2018 |
Information technology |
Abdulaziz Almehmadi |
Artificial intelligence for intrusion detection systems in unmanned aerial vehicles |
Computers and Electrical Engineering 99, 107784, 2022 |
2022 |
Information technology |
Abdulaziz Almehmadi |
Language usage on Twitter predicts crime rates |
Proceedings of the 10th International Conference on Security of Information …, 2017 |
2017 |
Information technology |
Abdulaziz Almehmadi |
COVID-19 Pandemic Data Predict the Stock Market |
Computer Systems Science and Engineering 36 (3), pp. 451-460, 2021 |
2021 |
Information technology |
Abdulaziz Almehmadi |
Detecting malicious driving with machine learning |
2019 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2019 |
2019 |
Information technology |
Abdulaziz Almehmadi |
A distance-based data fusion technique for minimizing gps positioning error in vehicular ad hoc networks |
Proceedings of the 15th ACM International Symposium on QoS and Security for …, 2019 |
2019 |
Information technology |
Abdulaziz Almehmadi |
SCADA networks anomaly-based intrusion detection system |
Proceedings of the 11th International Conference on Security of Information …, 2018 |
2018 |
Information technology |
Abdulaziz Almehmadi |
Big data analytics architecture for security intelligence |
Proceedings of the 11th International Conference on Security of Information …, 2018 |
2018 |
Information technology |
Abdulaziz Almehmadi |
Intention-based trust re-evaluation |
2016 14th Annual Conference on Privacy, Security and Trust (PST), 437-444, 2016 |
2016 |
Information technology |
Abdulaziz Almehmadi |
Micro-behavioral accidental click detection system for preventing slip-based human error |
Sensors 21 (24), 8209, 2021 |
2021 |
Information technology |
Abdulaziz Almehmadi |
Synchronous Head Movement as a Crowd-Behavior-Based Security System |
IEEE Access 9, 24263-24272, 2021 |
2021 |
Information technology |
Abdulaziz Almehmadi |
A Behavioral-Based Fingerprint Liveness and Willingness Detection System |
Applied Sciences 12 (22), 11460, 2022 |
2022 |
Information technology |
Abdulaziz Almehmadi |
A biometric‐based verification system for handwritten image‐based signatures using audio to image matching |
IET Biometrics 11 (2), 124-140, 2022 |
2022 |
Information technology |
Umar Albalawi |
Comparative analysis of 6T, 7T, 8T, 9T, and 10T realistic CNTFET based SRAM |
Journal of Nanotechnology 2017, 2017 |
2017 |
Information technology |
Umar Albalawi |
Secure and trusted telemedicine in Internet of Things IoT |
2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 30-34, 2018 |
2018 |
Information technology |
Umar Albalawi |
Classification of breast cancer mammogram images using convolution neural network |
Concurrency and Computation: Practice and Experience 34 (13), e5803, 2022 |
2022 |
Information technology |
Umar Albalawi |
Analysis of route stability in mobile multihop networks under random waypoint mobility |
IEEE Access 8, 168121-168136, 2020 |
2020 |
Information technology |
Umar Albalawi |
Countermeasure of statistical inference in database security |
2018 IEEE International Conference on Big Data (Big Data), 2044-2047, 2018 |
2018 |
Information technology |
Umar Albalawi |
A device-to-device system for safety and emergency services of mobile users |
IEEE Consumer Electronics Magazine 8 (5), 42-45, 2019 |
2019 |
Information technology |
Umar Albalawi |
Statistical process variation analysis of schottky-barrier type GNRFET for RF application |
2017 International Conference on Current Trends in Computer, Electrical …, 2017 |
2017 |
Information technology |
Umar Albalawi |
Fault-tolerant partition resolvability in mesh related networks and applications |
IEEE Access 10, 71521-71529, 2022 |
2022 |
Information technology |
Umar Albalawi |
Current Artificial Intelligence (AI) Techniques, Challenges, and Approaches in Controlling and Fighting COVID-19: A Review |
International Journal of Environmental Research and Public Health 19 (10), 5901, 2022 |
2022 |
Information technology |
Umar Albalawi |
Energy efficient routing considering link robustness in wireless sensor networks |
2017 IEEE International Conference on Power, Control, Signals and …, 2017 |
2017 |
Information technology |
Umar Albalawi |
Energy-efficient and Secure Wireless Communication for Telemedicine in IoT |
COMPUTER SYSTEMS SCIENCE AND ENGINEERING 43 (3), 1111-1130, 2022 |
2022 |
Information technology |
Umar Albalawi |
Mostar Index of Neural Networks and Applications |
IEEE Access 11, 21345-21353, 2023 |
2023 |
Information technology |
Umar Albalawi |
Securing Session Initiation Protocol |
Sensors 22 (23), 9103, 2022 |
2022 |
Information technology |
Umar Albalawi |
The Application of Fault-Tolerant Partition Resolvability in Cycle-Related Graphs |
Applied Sciences 12 (19), 9558, 2022 |
2022 |
Information technology |
Umar Albalawi |
Towards Flexible Transparent Authentication System for Mobile Application Security |
International Journal of Advanced Computer Science and Applications 13 (8), 2022 |
2022 |
Information technology |
Umar Albalawi |
Anomaly Detection using Network Metadata |
International Journal of Advanced Computer Science and Applications 13 (5), 2022 |
2022 |
Information technology |
Umar Albalawi |
Towards Security Awareness of Mobile Applications using Semantic-based Sentiment Analysis |
International Journal of Advanced Computer Science and Applications 13 (4), 2022 |
2022 |
Information technology |
Majed Aborokbah |
Effective attack detection in internet of medical things smart environment using a deep belief neural network |
IEEE Access 8, 77396-77404, 2020 |
2020 |
Computer science |
Majed Aborokbah |
Adaptive context aware decision computing paradigm for intensive health care delivery in smart cities—A case analysis |
Sustainable cities and society 41, 919-924, 2018 |
2018 |
Computer science |
Majed Aborokbah |
A new secure transmission scheme between senders and receivers using HVCHC without any loss |
EURASIP Journal on Wireless Communications and Networking 2019, 1-15, 2019 |
2019 |
Computer science |
Majed Aborokbah |
Review of advanced computational approaches on multiple sclerosis segmentation and classification |
IET Signal Processing 14 (6), 333-341, 2020 |
2020 |
Computer science |
Majed Aborokbah |
Two-stage classification model for the prediction of heart disease using IoMT and artificial intelligence |
Sensors 22 (2), 476, 2022 |
2022 |
Computer science |
Majed Aborokbah |
Social distance monitoring approach using wearable smart tags |
Electronics 10 (19), 2435, 2021 |
2021 |
Computer science |
Majed Aborokbah |
An Efficient USE-Net Deep Learning Model for Cancer Detection |
International Journal of Intelligent Systems 2023, 2023 |
2023 |
Computer science |
Majed Aborokbah |
A Context-Aware MRIPPER Algorithm for Heart Disease Prediction |
Journal of Healthcare Engineering 2022, 2022 |
2022 |
Computer science |
S.Manimurugan |
Effective attack detection in internet of medical things smart environment using a deep belief neural network |
IEEE Access 8, 77396-77404, 2020 |
2020 |
Information technology |
S.Manimurugan |
A hybrid fuzzy brain-storm optimization algorithm for the classification of brain tumor MRI images |
Journal of ambient intelligence and humanized computing, 1-9, 2020 |
2020 |
Information technology |
S.Manimurugan |
A new secure transmission scheme between senders and receivers using HVCHC without any loss |
EURASIP Journal on Wireless Communications and Networking 2019, 1-15, 2019 |
2019 |
Information technology |
S.Manimurugan |
Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system |
Microprocessors and Microsystems 79, 103261, 2020 |
2020 |
Information technology |
S.Manimurugan |
The clandestine image transmission scheme to prevent from the intruders |
International Journal of Advanced and Applied Sciences 4 (2), 52-60, 2017 |
2017 |
Information technology |
S.Manimurugan |
Two-stage classification model for the prediction of heart disease using IoMT and artificial intelligence |
Sensors 22 (2), 476, 2022 |
2022 |
Information technology |
S.Manimurugan |
Classification of breast cancer mammogram images using convolution neural network |
Concurrency and Computation: Practice and Experience 34 (13), e5803, 2022 |
2022 |
Information technology |
S.Manimurugan |
IoT-Fog-Cloud model for anomaly detection using improved Naïve Bayes and principal component analysis |
Journal of Ambient Intelligence and Humanized Computing, 1-10, 2021 |
2021 |
Information technology |
S.Manimurugan |
Detection of heartbeat sounds arrhythmia using automatic spectral methods and cardiac auscultatory |
The Journal of Supercomputing 76, 5899-5922, 2020 |
2020 |
Information technology |
S.Manimurugan |
A user-based video recommendation approach using CAC filtering, PCA with LDOS-CoMoDa |
The Journal of Supercomputing, 1-15, 2022 |
2022 |
Information technology |
S.Manimurugan |
Hybrid high performance intelligent computing approach of CACNN and RNN for skin cancer image grading |
Soft Computing 27 (1), 579-589, 2023 |
2023 |
Information technology |
S.Manimurugan |
Multiclass classification for detection of COVID-19 infection in chest X-rays using CNN |
Computational Intelligence and Neuroscience 2022, 2022 |
2022 |
Information technology |
S.Manimurugan |
Ovarian cysts classification using novel deep reinforcement learning with Harris Hawks Optimization method |
The Journal of Supercomputing, 1-24, 2022 |
2022 |
Information technology |
S.Manimurugan |
Energy-efficient and Secure Wireless Communication for Telemedicine in IoT |
COMPUTER SYSTEMS SCIENCE AND ENGINEERING 43 (3), 1111-1130, 2022 |
2022 |
Information technology |
S.Manimurugan |
Stacking ensemble approach for DDoS attack detection in software-defined cyber–physical systems |
Computers and Electrical Engineering 107, 108635, 2023 |
2023 |
Information technology |
S.Manimurugan |
Non-divergent traffic management scheme using classification learning for smart transportation systems |
Computers and Electrical Engineering 106, 108581, 2023 |
2023 |
Information technology |
S.Manimurugan |
An Efficient USE-Net Deep Learning Model for Cancer Detection |
International Journal of Intelligent Systems 2023, 2023 |
2023 |
Information technology |
S.Manimurugan |
A Context-Aware MRIPPER Algorithm for Heart Disease Prediction |
Journal of Healthcare Engineering 2022, 2022 |
2022 |
Information technology |
Mohammed Alotaibi |
Challenges associated with treating children with diabetes in Saudi Arabia |
diabetes research and clinical practice 120, 235-240, 2016 |
2016 |
Information technology |
Mohammed Alotaibi |
Efficacy of Emerging Technologies to Manage Childhood Obesity |
Diabetes, Metabolic Syndrome and Obesity: Targets and Therapy, 1227-1244, 2022 |
2022 |
Information technology |
Mohammed Alotaibi |
Enhancing polycystic ovarian syndrome awareness using private social network |
Mhealth 6, 2020 |
2020 |
Information technology |
Mohammed Alotaibi |
A social robotics children diabetes management and educational system for Saudi Arabia: system architecture |
2015 Second International Conference on Computer Science, Computer …, 2015 |
2015 |
Information technology |
Mohammed Alotaibi |
A mobile gestational diabetes management and educational system for gulf countries: system architecture |
2018 9th IEEE Control and System Graduate Research Colloquium (ICSGRC), 193-196, 2018 |
2018 |
Information technology |
Mohammed Alotaibi |
A mobile diabetes educational system for fasting type-2 diabetics in Saudi Arabia |
2015 2nd International Conference on Information Technology, Computer, and …, 2015 |
2015 |
Information technology |
Mohammed Alotaibi |
A mobile Polycystic ovarian syndrome management and awareness system for Gulf countries: System architecture |
2016 SAI Computing Conference (SAI), 1164-1167, 2016 |
2016 |
Information technology |
Mohammed Alotaibi |
Design and Evaluation of a Personal Robot Playing a Self-Management for Children with Obesity |
Electronics 11 (23), 4000, 2022 |
2022 |
Information technology |
Mohammed Alotaibi |
Finger-Gesture Controlled Wheelchair with Enabling IoT |
Sensors 22 (22), 8716, 2022 |
2022 |
Information technology |
Mohammed Alotaibi |
A Study on Perception of Managing hypertension through Social Networking in Gulf Countries |
2018 9th IEEE Control and System Graduate Research Colloquium (ICSGRC), 188-192, 2018 |
2018 |
Information technology |
Mohammed Alotaibi |
Effectiveness of e-health systems in improving hypertension management and awareness: a systematic review |
KSII Transactions on Internet and Information Systems (TIIS) 16 (1), 173-187, 2022 |
2022 |
Information technology |
Mohammed Alotaibi |
A social hypertension awareness and management system (SHAMS) for gulf countries (SHAMS): System architecture |
2016 International Conference on Computation of Power, Energy Information …, 2016 |
2016 |
Information technology |
Mohammed Mustafa Ali |
A hybrid fuzzy brain-storm optimization algorithm for the classification of brain tumor MRI images |
Journal of ambient intelligence and humanized computing, 1-9, 2020 |
2020 |
Computer science |
Mohammed Mustafa Ali |
Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system |
Microprocessors and Microsystems 79, 103261, 2020 |
2020 |
Computer science |
Mohammed Mustafa Ali |
Detection of heartbeat sounds arrhythmia using automatic spectral methods and cardiac auscultatory |
The Journal of Supercomputing 76, 5899-5922, 2020 |
2020 |
Computer science |
Mohammed Mustafa Ali |
Mixed language Arabic-English information retrieval |
Computational Linguistics and Intelligent Text Processing: 16th …, 2015 |
2015 |
Computer science |
Mohammed Mustafa Ali |
Current Artificial Intelligence (AI) Techniques, Challenges, and Approaches in Controlling and Fighting COVID-19: A Review |
International Journal of Environmental Research and Public Health 19 (10), 5901, 2022 |
2022 |
Computer science |
Mohammed Mustafa Ali |
Ovarian cysts classification using novel deep reinforcement learning with Harris Hawks Optimization method |
The Journal of Supercomputing, 1-24, 2022 |
2022 |
Computer science |
Mohammed Mustafa Ali |
Novel approach in multilingual and mixed English-Arabic test collection |
International Journal of Computing Science and Mathematics 11 (3), 291-304, 2020 |
2020 |
Computer science |
Mohammed Mustafa Ali |
Towards Security Awareness of Mobile Applications using Semantic-based Sentiment Analysis |
International Journal of Advanced Computer Science and Applications 13 (4), 2022 |
2022 |
Computer science |
Nojood O Aljehane |
An optimal segmentation with deep learning based inception network model for intracranial hemorrhage diagnosis |
Neural Computing and Applications 33 (20), 13831-13843, 2021 |
2021 |
Computer science |
Nojood O Aljehane |
Evaluating medical travelers’ satisfaction through online review analysis |
Journal of Hospitality and Tourism Management 48, 519-537, 2021 |
2021 |
Computer science |
Nojood O Aljehane |
A self-embedding technique for tamper detection and localization of medical images for smart-health |
Multimedia Tools and Applications 80, 29939-29964, 2021 |
2021 |
Computer science |
Nojood O Aljehane |
An image encryption algorithm based on new generalized fusion fractal structure |
Information Sciences 592, 1-20, 2022 |
2022 |
Computer science |
Nojood O Aljehane |
Knowledge discovery for course choice decision in Massive Open Online Courses using machine learning approaches |
Expert Systems with Applications 199, 117092, 2022 |
2022 |
Computer science |
Nojood O Aljehane |
Big data analytics with oppositional moth flame optimization based vehicular routing protocol for future smart cities |
Expert Systems 39 (5), e12718, 2022 |
2022 |
Computer science |
Nojood O Aljehane |
Optimal allocation of renewable energy source and charging station for PHEVs |
Sustainable Energy Technologies and Assessments 49, 101669, 2022 |
2022 |
Computer science |
Nojood O Aljehane |
Fraud detection in credit cards using logistic regression |
International Journal of Advanced Computer Science and Applications 11 (12), 2020 |
2020 |
Computer science |
Nojood O Aljehane |
A secure intrusion detection system in cyberphysical systems using a parameter-tuned deep-stacked autoencoder |
CMC-COMPUTERS MATERIALS & CONTINUA 68 (3), 3915-3929, 2021 |
2021 |
Computer science |
Nojood O Aljehane |
Eye State Identification Utilizing EEG Signals: A Combined Method Using Self-Organizing Map and Deep Belief Network |
Scientific Programming 2022, 2022 |
2022 |
Computer science |
Nojood O Aljehane |
Information sharing search boosted whale optimizer with Nelder-Mead simplex for parameter estimation of photovoltaic models |
Energy Conversion and Management 270, 116246, 2022 |
2022 |
Computer science |
Nojood O Aljehane |
Intelligent Classification Model for Biomedical Pap Smear Images on IoT Environment |
Computers, Materials & Continua, pp.3969-3983, 2022 |
2022 |
Computer science |
Wahid Rajeh |
Saudi cloud infrastructure: a security analysis |
Science China Information Sciences 60, 1-13, 2017 |
2017 |
Information technology |
Wahid Rajeh |
6G Connected Vehicle Framework to Support Intelligent Road Maintenance Using Deep Learning Data Fusion |
IEEE Transactions on Intelligent Transportation Systems, 2023 |
2023 |
Information technology |
Wahid Rajeh |
Privacy-Preserving E-Voting System Supporting Score Voting Using Blockchain |
Applied Sciences 13 (2), 1096, 2023 |
2023 |
Information technology |
Ahmed Saleh |
Firefly-inspired time synchronization mechanism for self-organizing energy-efficient wireless sensor networks: A survey |
IEEE Access 7, 115229-115248, 2019 |
2019 |
Information technology |
Ahmed Saleh |
Random traveling wave pulse-coupled oscillator algorithm of energy-efficient wireless sensor networks |
International Journal of Distributed Sensor Networks 14 (4), 1550147718768991, 2018 |
2018 |
Information technology |
Ahmed .M Alwakeel |
An overview of fog computing and edge computing security and privacy issues |
Sensors 21 (24), 8226, 2021 |
2021 |
Information technology |
Ahmed .M Alwakeel |
Deep Learning-Based Diagnosis of Alzheimer’s Disease |
Journal of Personalized Medicine 12 (5), 815, 2022 |
2022 |
Information technology |
Ahmed .M Alwakeel |
Towards a security reference architecture for NFV |
Sensors 22 (10), 3750, 2022 |
2022 |
Information technology |
Ahmed .M Alwakeel |
Common Mental Disorders in Smart City Settings and Use of Multimodal Medical Sensor Fusion to Detect Them |
Diagnostics 13 (6), 1082, 2023 |
2023 |
Information technology |
Ahmed .M Alwakeel |
Machine-Learning-Based IoT–Edge Computing Healthcare Solutions |
Electronics 12 (4), 1027, 2023 |
2023 |
Information technology |
Ahmed .M Alwakeel |
Performance Evaluation of Different Decision Fusion Approaches for Image Classification |
Applied Sciences 13 (2), 1168, 2023 |
2023 |
Information technology |
Ahmed .M Alwakeel |
Optimal trajectory UAV path design based on bezier curves with multi-hop cluster selection in wireless networks |
Wireless Networks, 1-12, 2022 |
2022 |
Information technology |
Ahmed .M Alwakeel |
A Symbols Based BCI Paradigm for Intelligent Home Control Using P300 Event-Related Potentials |
Sensors 22 (24), 10000, 2022 |
2022 |
Information technology |
Ahmed .M Alwakeel |
Cloud Servers: Resource Optimization Using Different Energy Saving Techniques |
Sensors 22 (21), 8384, 2022 |
2022 |
Information technology |
Ibrahim Sulaiman Alkhazi |
Arabic OCR evaluation tool |
2016 7th international conference on computer science and information …, 2016 |
2016 |
Computer science |
Ibrahim Sulaiman Alkhazi |
Classifying and segmenting classical and modern standard Arabic using minimum cross-entropy |
International Journal of Advanced Computer Science and Applications 8 (4), 2017 |
2017 |
Computer science |
Ibrahim Sulaiman Alkhazi |
Tag based models for Arabic text compression |
2017 Intelligent Systems Conference (IntelliSys), 697-705, 2017 |
2017 |
Computer science |
Ibrahim Sulaiman Alkhazi |
DeepVeil: deep learning for identification of face, gender, expression recognition under veiled conditions |
International Journal of Biometrics 14 (3-4), 453-480, 2022 |
2022 |
Computer science |
Ibrahim Sulaiman Alkhazi |
BAAC: Bangor Arabic Annotated Corpus |
Mach. Transl 22, 23, 2018 |
2018 |
Computer science |
Ibrahim Sulaiman Alkhazi |
COVID-19 Diagnosis and Classification Using Radiological Imaging and Deep Learning Techniques: A Comparative Study |
Diagnostics 12 (8), 1880, 2022 |
2022 |
Computer science |
Ibrahim Sulaiman Alkhazi |
Modeling and Analysis of Proof-Based Strategies for Distributed Consensus in Blockchain-Based Peer-to-Peer Networks |
Sustainability 15 (2), 1478, 2023 |
2023 |
Computer science |
Ahamed Aljuhani |
Holistic DDoS mitigation using NFV |
2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017 |
2017 |
Information technology |
Ahamed Aljuhani |
Virtualized network functions security attacks and vulnerabilities |
2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017 |
2017 |
Information technology |
Ahamed Aljuhani |
Machine learning approaches for combating distributed denial of service attacks in modern networking environments |
IEEE Access 9, 42236-42264, 2021 |
2021 |
Information technology |
Ahamed Aljuhani |
Deep learning and smart contract-assisted secure data sharing for IoT-based intelligent agriculture |
IEEE Intelligent Systems, 2022 |
2022 |
Information technology |
Ahamed Aljuhani |
Anomaly detection for internet of things cyberattacks |
Computers, Materials & Continua 72 (1), 261-279, 2022 |
2022 |
Information technology |
Ahamed Aljuhani |
Fog intelligence for secure smart villages: Architecture, and future challenges |
IEEE Consumer Electronics Magazine, 2022 |
2022 |
Information technology |
Ahamed Aljuhani |
Anomaly detection framework in fog-to-things communication for industrial internet of things |
CMC-COMPUTERS MATERIALS & CONTINUA 73 (1), 1067-1086, 2022 |
2022 |
Information technology |
Ahamed Aljuhani |
Early detection of digital mammogram using kernel extreme learning machine |
Concurrency and Computation: Practice and Experience 34 (15), e6971, 2022 |
2022 |
Information technology |
Ahamed Aljuhani |
Energy-efficient and Secure Wireless Communication for Telemedicine in IoT |
COMPUTER SYSTEMS SCIENCE AND ENGINEERING 43 (3), 1111-1130, 2022 |
2022 |
Information technology |
Ahamed Aljuhani |
IDS-Chain: A Collaborative Intrusion Detection Framework Empowered Blockchain for Internet of Medical Things |
2022 IEEE Cloud Summit, 57-62, 2022 |
2022 |
Information technology |
Ahamed Aljuhani |
Anomaly Detection and Localization for Process Security Based on the Multivariate Statistical Method |
Mathematical Problems in Engineering 2022, 2022 |
2022 |
Information technology |
Ahamed Aljuhani |
An Improved Fault Diagnosis Strategy for Process Monitoring Using Reconstruction Based Contributions |
IEEE Access 9, 79520-79533, 2021 |
2021 |
Information technology |
Saleh Albelwi |
Survey on self-supervised learning: auxiliary pretext tasks and contrastive learning methods in imaging |
Entropy 24 (4), 551, 2022 |
2022 |
Computer science |
Saleh Albelwi |
Deep Architecture Based on DenseNet-121 Model for Weather Image Recognition |
International Journal of Advanced Computer Science and Applications(IJACSA …, 2022 |
2022 |
Computer science |
Saleh Albelwi |
A real time Arabic sign language alphabets (ArSLA) recognition model using deep learning architecture |
Computers 11 (5), 78, 2022 |
2022 |
Computer science |
Saleh Albelwi |
A SLAM-based localization and navigation system for social robots: The pepper robot case |
Machines 11 (2), 158, 2023 |
2023 |
Computer science |
Saleh Albelwi |
A Systematic Approach for Exploring Underground Environment Using LiDAR-Based System |
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023 |
2023 |
Computer science |
A'aeshah Alhakamy |
Move your body: Engaging museum visitors with human-data interaction |
Proceedings of the 2020 chi conference on human factors in computing systems …, 2020 |
2020 |
Computer science |
A'aeshah Alhakamy |
Exploring casual covid-19 data visualizations on twitter: Topics and challenges |
Informatics 7 (3), 35, 2020 |
2020 |
Computer science |
A'aeshah Alhakamy |
Real-time illumination and visual coherence for photorealistic augmented/mixed reality |
ACM Computing Surveys (CSUR) 53 (3), 1-34, 2020 |
2020 |
Computer science |
A'aeshah Alhakamy |
CubeMap360: interactive global illumination for augmented reality in dynamic environment |
2019 SoutheastCon, 1-8, 2019 |
2019 |
Computer science |
A'aeshah Alhakamy |
A Comprehensive Overview on Biometric Authentication Systems using Artificial Intelligence Techniques |
International Journal of Advanced Computer Science and Applications 13 (4), 2022 |
2022 |
Computer science |
A'aeshah Alhakamy |
Show Me How You Interact, I Will Tell You What You Think: Exploring the Effect of the Interaction Style on Users’ Sensemaking about Correlation and Causation in Data |
Designing Interactive Systems Conference 2021, 564-575, 2021 |
2021 |
Computer science |
A'aeshah Alhakamy |
An empirical evaluation of the performance of real-time illumination approaches: realistic scenes in augmented reality |
International Conference on Augmented Reality, Virtual Reality and Computer …, 2019 |
2019 |
Computer science |
A'aeshah Alhakamy |
Fathoming the Mandela Effect: Deploying Reinforcement Learning to Untangle the Multiverse |
Symmetry 15 (3), 699, 2023 |
2023 |
Computer science |
A'aeshah Alhakamy |
Are Used Cars More Sustainable? Price Prediction Based on Linear Regression |
Sustainability 15 (2), 911, 2023 |
2023 |
Computer science |
A'aeshah Alhakamy |
Prediction of Quality of Water According to a Random Forest Classifier |
International Journal of Advanced Computer Science and Applications(IJACSA …, 2022 |
2022 |
Computer science |
A'aeshah Alhakamy |
Prediction of Oil Production Through Linear Regression Model and Big Data Tools |
International Journal of Advanced Computer Science and Applications(IJACSA …, 2022 |
2022 |
Computer science |
A'aeshah Alhakamy |
Design Strategies and Optimizations for Human-Data Interaction Systems in Museums |
2020 IEEE 20th International Conference on Advanced Learning Technologies …, 2020 |
2020 |
Computer science |
Okba Taouali |
Machine learning technique for data-driven fault detection of nonlinear processes |
Journal of Intelligent Manufacturing 31, 865-884, 2020 |
2020 |
Engineering |
Okba Taouali |
Supervised process monitoring and fault diagnosis based on machine learning methods |
The International Journal of Advanced Manufacturing Technology 102, 2321-2337, 2019 |
2019 |
Engineering |
Okba Taouali |
A novel machine learning approach for breast cancer diagnosis |
Measurement 187, 110233, 2022 |
2022 |
Engineering |
Okba Taouali |
Enhanced SVM–KPCA method for brain MR image classification |
The Computer Journal 63 (3), 383-394, 2020 |
2020 |
Engineering |
Okba Taouali |
Fault detection of uncertain nonlinear process using reduced interval kernel principal component analysis (RIKPCA) |
The International Journal of Advanced Manufacturing Technology 106, 4567-4576, 2020 |
2020 |
Engineering |
Okba Taouali |
A new Bio-CAD system based on the optimized KPCA for relevant feature selection |
The International Journal of Advanced Manufacturing Technology 102, 1023-1034, 2019 |
2019 |
Engineering |
Okba Taouali |
Interval valued data driven approach for sensor fault detection of nonlinear uncertain process |
Measurement 171, 108776, 2021 |
2021 |
Engineering |
Okba Taouali |
Reduced Rank KPCA based on GLRT chart for sensor fault detection in nonlinear chemical process |
Measurement 169, 108342, 2021 |
2021 |
Engineering |
Okba Taouali |
A new monitoring scheme of an air quality network based on the kernel method |
The International Journal of Advanced Manufacturing Technology 103, 153-163, 2019 |
2019 |
Engineering |
Okba Taouali |
Early detection of digital mammogram using kernel extreme learning machine |
Concurrency and Computation: Practice and Experience 34 (15), e6971, 2022 |
2022 |
Engineering |
Okba Taouali |
Anomaly detection for process monitoring based on machine learning technique |
Neural Computing and Applications, 1-25, 2022 |
2022 |
Engineering |
Okba Taouali |
A New Anomaly Detection Indexbased Moving Window Interval PCA |
2022 5th International Conference on Advanced Systems and Emergent …, 2022 |
2022 |
Engineering |
Okba Taouali |
Anomaly Detection and Localization for Process Security Based on the Multivariate Statistical Method |
Mathematical Problems in Engineering 2022, 2022 |
2022 |
Engineering |
Okba Taouali |
An Improved Fault Diagnosis Strategy for Process Monitoring Using Reconstruction Based Contributions |
IEEE Access 9, 79520-79533, 2021 |
2021 |
Engineering |
Okba Taouali |
Uncertain Dynamic Process Monitoring Using Moving Window Interval PCA |
2021 18th International Multi-Conference on Systems, Signals & Devices (SSD …, 2021 |
2021 |
Engineering |
Okba Taouali |
An enhanced CAD system based on machine Learning Algorithm for brain MRI classification |
Journal of Intelligent & Fuzzy Systems 41 (1), 1845-1854, 2021 |
2021 |
Engineering |
Okba Taouali |
New kernel method for MRI classification |
2019 16th International Multi-Conference on Systems, Signals & Devices (SSD …, 2019 |
2019 |
Engineering |
Emad Alharbi |
Comparison of automated crystallographic model-building pipelines |
Acta Crystallographica Section D: Structural Biology 75 (12), 1119-1128, 2019 |
2019 |
Information technology |
Emad Alharbi |
Pairwise running of automated crystallographic model-building pipelines |
Acta Crystallographica Section D: Structural Biology 76 (9), 814-823, 2020 |
2020 |
Information technology |
Emad Alharbi |
Predicting the performance of automated crystallographic model-building pipelines |
Acta Crystallographica Section D: Structural Biology 77 (12), 1591-1601, 2021 |
2021 |
Information technology |
Lubna A. Alharbi |
An Efficient Approach for Crops Pests Recognition and Classification Based on Novel DeepPestNet Deep Learning Model |
IEEE Access 10, 73019-73032, 2022 |
2022 |
Information technology |
Lubna A. Alharbi |
Artificial Jellyfish Optimization with Deep-Learning-Driven Decision Support System for Energy Management in Smart Cities |
Applied Sciences 12 (15), 7457, 2022 |
2022 |
Information technology |
Lubna A. Alharbi |
A Systematic Literature Review on AI Algorithms and Techniques Adopted by e-Learning Platforms for Psychological and Emotional States |
International Journal of Advanced Computer Science and Applications, 2023 |
2023 |
Information technology |
Lubna A. Alharbi |
Optimal trajectory UAV path design based on bezier curves with multi-hop cluster selection in wireless networks |
Wireless Networks, 1-12, 2022 |
2022 |
Information technology |
Lubna A. Alharbi |
Cloud Servers: Resource Optimization Using Different Energy Saving Techniques |
Sensors 22 (21), 8384, 2022 |
2022 |
Information technology |
Lubna A. Alharbi |
Improved Bat Algorithm with Deep Learning-Based Biomedical ECG Signal Classification Model |
Computers, Materials & Continua, 3151-3166, 2022 |
2022 |
Information technology |
Lubna A. Alharbi |
Deep Learning Enabled Intelligent Healthcare Management System in Smart Cities Environment |
Computers, Materials & Continua, 4483-4500, 2022 |
2022 |
Information technology |
Muhammad Ayaz |
Internet-of-Things (IoT)-based smart agriculture: Toward making the fields talk |
IEEE access 7, 129551-129583, 2019 |
2019 |
Information technology |
Muhammad Ayaz |
Wireless sensor’s civil applications, prototypes, and future integration possibilities: A review |
IEEE Sensors Journal 18 (1), 4-30, 2017 |
2017 |
Information technology |
Muhammad Ayaz |
UAV-assisted dynamic clustering of wireless sensor networks for crop health monitoring |
Sensors 18 (2), 555, 2018 |
2018 |
Information technology |
Muhammad Ayaz |
A multi-layer cluster based energy efficient routing scheme for UWSNs |
IEEE Access 7, 77398-77410, 2019 |
2019 |
Information technology |
Muhammad Ayaz |
Wireless sensor network: A complete solution for poultry farming |
2014 IEEE 2nd International Symposium on Telecommunication Technologies …, 2014 |
2014 |
Information technology |
Muhammad Ayaz |
Distance based reliable and energy efficient (DREE) routing protocol for underwater acoustic sensor networks |
Journal of Networks 10 (5), 311, 2015 |
2015 |
Information technology |
Muhammad Ayaz |
Key factors involved in pipeline monitoring techniques using robots and WSNs: Comprehensive survey |
Journal of Pipeline Systems Engineering and Practice 9 (2), 04018001, 2018 |
2018 |
Information technology |
Muhammad Ayaz |
Cloud-connected flying edge computing for smart agriculture |
Peer-to-Peer Networking and Applications 14 (6), 3405-3415, 2021 |
2021 |
Information technology |
Muhammad Ayaz |
UAV routing protocol for crop health management |
2016 24th European Signal Processing Conference (EUSIPCO), 1818-1822, 2016 |
2016 |
Information technology |
Muhammad Ayaz |
Hop-by-hop dynamic addressing based routing protocol for monitoring of long range underwater pipeline |
KSII Transactions on Internet and Information Systems (TIIS) 11 (2), 731-763, 2017 |
2017 |
Information technology |
Muhammad Ayaz |
An overview of routing techniques for road and pipeline monitoring in linear sensor networks |
Wireless Networks 24, 2133-2143, 2018 |
2018 |
Information technology |
Muhammad Ayaz |
Affordable broad agile farming system for rural and remote area |
IEEE Access 7, 127098-127116, 2019 |
2019 |
Information technology |
Muhammad Ayaz |
On the PAPR reduction: A novel filtering based hadamard transform precoded uplink MC-NOMA scheme for 5G cellular networks |
2018 1st International Conference on Computer Applications & Information …, 2018 |
2018 |
Information technology |
Muhammad Ayaz |
Towards formal modeling of subnet based hotspot algorithm in wireless sensor networks |
Wireless Personal Communications 107, 1573-1606, 2019 |
2019 |
Information technology |
Muhammad Ayaz |
Participants ranking algorithm for crowdsensing in mobile communication |
EAI Endorsed Transactions on Scalable Information Systems 5 (16), 2018 |
2018 |
Information technology |
Muhammad Ayaz |
Prolong network lifetime in the wireless sensor networks: an improved approach |
Arabian Journal for Science and Engineering 46, 3631-3651, 2021 |
2021 |
Information technology |
Muhammad Ayaz |
Sustainable seawater desalination: Current status, environmental implications and future expectations |
Desalination 540, 116022, 2022 |
2022 |
Information technology |
Muhammad Ayaz |
PAPR reduction in mobile WiMAX: a novel DST precoding based random interleaved OFDMA uplink system |
Wireless networks 20, 1213-1222, 2014 |
2014 |
Information technology |
Muhammad Ayaz |
Energy efficient and link reliable routing (E2LR) scheme for underwater sensor networks |
Peer-to-Peer Networking and Applications 14, 1870-1888, 2021 |
2021 |
Information technology |
Muhammad Ayaz |
Priority-based task scheduling and resource allocation in edge computing for health monitoring system |
Journal of King Saud University-Computer and Information Sciences 35 (2 …, 2023 |
2023 |
Information technology |
Muhammad Ayaz |
A balanced energy efficient (BEE) routing scheme for underwater WSNs |
Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings …, 2020 |
2020 |
Information technology |
Muhammad Ayaz |
A hybrid data collection scheme to achieve load balancing for underwater sensor networks |
Journal of King Saud University-Computer and Information Sciences 35 (3), 74-86, 2023 |
2023 |
Information technology |
Muhammad Ayaz |
AUV-Based Efficient Data Collection Scheme for Underwater Linear Sensor Networks |
International Journal on Semantic Web and Information Systems (IJSWIS) 18 (1 …, 2022 |
2022 |
Information technology |
Muhammad Ayaz |
Ground target finding mechanism for unmanned aerial vehicles to secure crop field data |
Transactions on emerging telecommunications technologies 32 (3), e4210, 2021 |
2021 |
Information technology |
Muhammad Ayaz |
A Joint Filtering and Precoding Based Uplink MC-NOMA |
2018 International Symposium on Networks, Computers and Communications …, 2018 |
2018 |
Information technology |
Narmatha C |
A hybrid fuzzy brain-storm optimization algorithm for the classification of brain tumor MRI images |
Journal of ambient intelligence and humanized computing, 1-9, 2020 |
2020 |
Computer science |
Narmatha C |
Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system |
Microprocessors and Microsystems 79, 103261, 2020 |
2020 |
Computer science |
Narmatha C |
Two-stage classification model for the prediction of heart disease using IoMT and artificial intelligence |
Sensors 22 (2), 476, 2022 |
2022 |
Computer science |
Narmatha C |
Ovarian cysts classification using novel deep reinforcement learning with Harris Hawks Optimization method |
The Journal of Supercomputing, 1-24, 2022 |
2022 |
Computer science |
Narmatha C |
An Efficient USE-Net Deep Learning Model for Cancer Detection |
International Journal of Intelligent Systems 2023, 2023 |
2023 |
Computer science |
Narmatha C |
A Context-Aware MRIPPER Algorithm for Heart Disease Prediction |
Journal of Healthcare Engineering 2022, 2022 |
2022 |
Computer science |
Adel R. Alharbi |
Fog big data analysis for IoT sensor application using fusion deep learning |
Mathematical Problems in Engineering 2021, 1-16, 2021 |
2021 |
Information technology |
Adel R. Alharbi |
Cryptanalysis of internet of health things encryption scheme based on chaotic maps |
IEEE Access 9, 105678-105685, 2021 |
2021 |
Information technology |
Adel R. Alharbi |
Securing 5G-IoT device connectivity and coverage using Boltzmann machine keys generation |
Mathematical Problems in Engineering 2021, 1-10, 2021 |
2021 |
Information technology |
Adel R. Alharbi |
AES Based White Box Cryptography in Digital Signature Verification |
Sensors 22 (23), 9444, 2022 |
2022 |
Information technology |
Adel R. Alharbi |
Predicting rogue content and Arabic spammers on twitter |
Future Internet 11 (11), 229, 2019 |
2019 |
Information technology |
Adel R. Alharbi |
Construction of s-boxes using different maps over elliptic curves for image encryption |
IEEE Access 9, 157106-157123, 2021 |
2021 |
Information technology |
Adel R. Alharbi |
IBOOST: A lightweight provably secure identity-based online/offline signature technique based on FCM for massive devices in 5G wireless sensor networks |
IEEE Access 9, 131336-131347, 2021 |
2021 |
Information technology |
Adel R. Alharbi |
A novel image encryption technique based on cyclic codes over Galois field |
Computational Intelligence and Neuroscience 2022, 2022 |
2022 |
Information technology |
Adel R. Alharbi |
Integration of spatial and frequency domain encryption for digital images |
IEEE Access 9, 149943-149954, 2021 |
2021 |
Information technology |
Adel R. Alharbi |
Detection of heartbeat sounds arrhythmia using automatic spectral methods and cardiac auscultatory |
The Journal of Supercomputing 76, 5899-5922, 2020 |
2020 |
Information technology |
Adel R. Alharbi |
SBOOSP for massive devices in 5G WSNs using conformable chaotic maps |
Computers, Materials & Continua 71 (3), 4591-4608, 2022 |
2022 |
Information technology |
Adel R. Alharbi |
Enhancing topic clustering for Arabic security news based on k‐means and topic modelling |
IET Networks 10 (6), 278-294, 2021 |
2021 |
Information technology |
Adel R. Alharbi |
An efficient electronic cash system based on certificateless group signcryption scheme using conformable chaotic maps |
Sensors 21 (21), 7039, 2021 |
2021 |
Information technology |
Adel R. Alharbi |
Elliptic-Curve Crypto Processor for RFID Applications |
Applied Sciences 11 (15), 7079, 2021 |
2021 |
Information technology |
Adel R. Alharbi |
An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures |
Computers, Materials & Continua 72 (1), 1373-1389, 2022 |
2022 |
Information technology |
Adel R. Alharbi |
A novel low-area point multiplication architecture for elliptic-curve cryptography |
Electronics 10 (21), 2698, 2021 |
2021 |
Information technology |
Adel R. Alharbi |
A provably secure IBE transformation model for PKC using conformable Chebyshev chaotic maps under human-centered IoT environments |
Sensors 21 (21), 7227, 2021 |
2021 |
Information technology |
Adel R. Alharbi |
Fast fail-over technique for distributed controller architecture in software-defined networks |
IEEE Access 7, 160718-160737, 2019 |
2019 |
Information technology |
Adel R. Alharbi |
Preemptive two-stage update mechanism for software-defined networks |
2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium …, 2019 |
2019 |
Information technology |
Adel R. Alharbi |
An Innovative Methodology for Network Latency Detection Based on IoT Centered Blockchain Transactions |
Wireless Communications and Mobile Computing 2022, 2022 |
2022 |
Information technology |
Adel R. Alharbi |
Smart Healthcare System with Light-Weighted Blockchain System and Deep Learning Techniques |
Computational Intelligence and Neuroscience 2022, 2022 |
2022 |
Information technology |
Adel R. Alharbi |
An Efficient Crypto Processor Architecture for Side-Channel Resistant Binary Huff Curves on FPGA |
Electronics 11 (7), 1131, 2022 |
2022 |
Information technology |
Adel R. Alharbi |
Quaternion integers based higher length cyclic codes and their decoding algorithm |
CMC-COMPUTERS MATERIALS & CONTINUA 73 (1), 1177-1194, 2022 |
2022 |
Information technology |
Adel R. Alharbi |
A low-overhead countermeasure against differential power analysis for aes block cipher |
Applied Sciences 11 (21), 10314, 2021 |
2021 |
Information technology |
Adel R. Alharbi |
DAMAC: A Delay-Aware MAC Protocol for Ad Hoc Underwater Acoustic Sensor Networks |
Sensors 21 (15), 5229, 2021 |
2021 |
Information technology |
Adel R. Alharbi |
Construction and Optimization of Dynamic S-Boxes based on Gaussian distribution |
IEEE Access, 2023 |
2023 |
Information technology |
Adel R. Alharbi |
Large Field-Size Throughput/Area Accelerator for Elliptic-Curve Point Multiplication on FPGA |
Applied Sciences 13 (2), 869, 2023 |
2023 |
Information technology |
Adel R. Alharbi |
Latency-Aware Accelerator of SIMECK Lightweight Block Cipher |
Applied Sciences 13 (1), 161, 2023 |
2023 |
Information technology |
Adel R. Alharbi |
Website Defacement Detection and Monitoring Methods: A Review |
Electronics 11 (21), 3573, 2022 |
2022 |
Information technology |
Adel R. Alharbi |
Blockchain-Enabled Smart Surveillance System with Artificial Intelligence |
Wireless Communications and Mobile Computing 2022, 2022 |
2022 |
Information technology |
Adel R. Alharbi |
A new multistage encryption scheme using linear feedback register and chaos-based quantum map |
Complexity 2022, 2022 |
2022 |
Information technology |
Adel R. Alharbi |
ACM-SH: An Efficient Access Control and Key Establishment Mechanism for Sustainable Smart Healthcare |
Sustainability 14 (8), 4661, 2022 |
2022 |
Information technology |
Adel R. Alharbi |
CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique Based on Fractional Chaotic Maps |
IEEE Access 10, 39853-39863, 2022 |
2022 |
Information technology |
Amer Aljaedi |
A survey on MAC protocol approaches for underwater wireless sensor networks |
IEEE Sensors Journal 21 (3), 3916-3932, 2020 |
2020 |
Information technology |
Amer Aljaedi |
Fog big data analysis for IoT sensor application using fusion deep learning |
Mathematical Problems in Engineering 2021, 1-16, 2021 |
2021 |
Information technology |
Amer Aljaedi |
Cryptanalysis of internet of health things encryption scheme based on chaotic maps |
IEEE Access 9, 105678-105685, 2021 |
2021 |
Information technology |
Amer Aljaedi |
Mapping ERD to knowledge graph |
2019 IEEE World Congress on Services (SERVICES) 2642, 110-114, 2019 |
2019 |
Information technology |
Amer Aljaedi |
Securing 5G-IoT device connectivity and coverage using Boltzmann machine keys generation |
Mathematical Problems in Engineering 2021, 1-10, 2021 |
2021 |
Information technology |
Amer Aljaedi |
AES Based White Box Cryptography in Digital Signature Verification |
Sensors 22 (23), 9444, 2022 |
2022 |
Information technology |
Amer Aljaedi |
Predicting rogue content and Arabic spammers on twitter |
Future Internet 11 (11), 229, 2019 |
2019 |
Information technology |
Amer Aljaedi |
Construction of s-boxes using different maps over elliptic curves for image encryption |
IEEE Access 9, 157106-157123, 2021 |
2021 |
Information technology |
Amer Aljaedi |
IBOOST: A lightweight provably secure identity-based online/offline signature technique based on FCM for massive devices in 5G wireless sensor networks |
IEEE Access 9, 131336-131347, 2021 |
2021 |
Information technology |
Amer Aljaedi |
SBOOSP for massive devices in 5G WSNs using conformable chaotic maps |
Computers, Materials & Continua 71 (3), 4591-4608, 2022 |
2022 |
Information technology |
Amer Aljaedi |
On the fault tolerant partition resolvability of toeplitz networks |
Mathematical Problems in Engineering 2022, 1-8, 2022 |
2022 |
Information technology |
Amer Aljaedi |
Enhancing topic clustering for Arabic security news based on k‐means and topic modelling |
IET Networks 10 (6), 278-294, 2021 |
2021 |
Information technology |
Amer Aljaedi |
An efficient electronic cash system based on certificateless group signcryption scheme using conformable chaotic maps |
Sensors 21 (21), 7039, 2021 |
2021 |
Information technology |
Amer Aljaedi |
Elliptic-Curve Crypto Processor for RFID Applications |
Applied Sciences 11 (15), 7079, 2021 |
2021 |
Information technology |
Amer Aljaedi |
Proactive load shifting for distributed sdn control plane architecture |
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2019 |
2019 |
Information technology |
Amer Aljaedi |
Boundedness of convex polytopes networks via local fractional metric dimension |
Mathematical Problems in Engineering 2021, 1-14, 2021 |
2021 |
Information technology |
Amer Aljaedi |
A novel low-area point multiplication architecture for elliptic-curve cryptography |
Electronics 10 (21), 2698, 2021 |
2021 |
Information technology |
Amer Aljaedi |
A provably secure IBE transformation model for PKC using conformable Chebyshev chaotic maps under human-centered IoT environments |
Sensors 21 (21), 7227, 2021 |
2021 |
Information technology |
Amer Aljaedi |
Fast fail-over technique for distributed controller architecture in software-defined networks |
IEEE Access 7, 160718-160737, 2019 |
2019 |
Information technology |
Amer Aljaedi |
Otmen: Offloading traffic monitoring to edge nodes in software-defined datacenter networks |
2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018 |
2018 |
Information technology |
Amer Aljaedi |
Fault Tolerant Addressing Scheme for Oxide Interconnection Networks |
Symmetry 14 (8), 1740, 2022 |
2022 |
Information technology |
Amer Aljaedi |
Fault-tolerant partition resolvability in mesh related networks and applications |
IEEE Access 10, 71521-71529, 2022 |
2022 |
Information technology |
Amer Aljaedi |
Atmospheric convection model based digital confidentiality scheme |
CMC-COMPUTERS MATERIALS & CONTINUA 71 (3), 4503-4522, 2022 |
2022 |
Information technology |
Amer Aljaedi |
Preemptive two-stage update mechanism for software-defined networks |
2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium …, 2019 |
2019 |
Information technology |
Amer Aljaedi |
Energy-efficient and Secure Wireless Communication for Telemedicine in IoT |
COMPUTER SYSTEMS SCIENCE AND ENGINEERING 43 (3), 1111-1130, 2022 |
2022 |
Information technology |
Amer Aljaedi |
A low-overhead countermeasure against differential power analysis for aes block cipher |
Applied Sciences 11 (21), 10314, 2021 |
2021 |
Information technology |
Amer Aljaedi |
An efficient audio encryption scheme based on finite fields |
IEEE Access 9, 144385-144394, 2021 |
2021 |
Information technology |
Amer Aljaedi |
DAMAC: A Delay-Aware MAC Protocol for Ad Hoc Underwater Acoustic Sensor Networks |
Sensors 21 (15), 5229, 2021 |
2021 |
Information technology |
Amer Aljaedi |
Mostar Index of Neural Networks and Applications |
IEEE Access 11, 21345-21353, 2023 |
2023 |
Information technology |
Amer Aljaedi |
Latency-Aware Accelerator of SIMECK Lightweight Block Cipher |
Applied Sciences 13 (1), 161, 2023 |
2023 |
Information technology |
Amer Aljaedi |
Large Field-Size Throughput/Area Accelerator for Elliptic-Curve Point Multiplication on FPGA |
Applied Sciences 13 (2), 869, 2023 |
2023 |
Information technology |
Amer Aljaedi |
Website Defacement Detection and Monitoring Methods: A Review |
Electronics 11 (21), 3573, 2022 |
2022 |
Information technology |
Amer Aljaedi |
The Application of Fault-Tolerant Partition Resolvability in Cycle-Related Graphs |
Applied Sciences 12 (19), 9558, 2022 |
2022 |
Information technology |
Amer Aljaedi |
Cryptography-Based Medical Signal Securing Using Improved Variation Mode Decomposition with Machine Learning Techniques |
Computational Intelligence and Neuroscience: CIN 2022, 2022 |
2022 |
Information technology |
Anas Bushnag |
Source anonymity against global adversary in wsns using dummy packet injections: A survey |
Electronics 7 (10), 250, 2018 |
2018 |
Engineering |
Anas Bushnag |
Air quality and climate control arduino monitoring system using fuzzy logic for indoor environments |
2020 International conference on control, automation and diagnosis (ICCAD), 1-6, 2020 |
2020 |
Engineering |
Anas Bushnag |
A SLAM-based localization and navigation system for social robots: The pepper robot case |
Machines 11 (2), 158, 2023 |
2023 |
Engineering |
Anas Bushnag |
An improved air quality and climate control monitoring system using fuzzy logic for enclosed areas |
Journal of Ambient Intelligence and Humanized Computing, 1-9, 2022 |
2022 |
Engineering |
Anas Bushnag |
A Systematic Approach for Exploring Underground Environment Using LiDAR-Based System |
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2023 |
2023 |
Engineering |
Anas Bushnag |
Color Edge Detection Using Multidirectional Sobel Filter and Fuzzy Fusion |
CMC-COMPUTERS MATERIALS & CONTINUA 74 (2), 2839-2852, 2023 |
2023 |
Engineering |
Tahani Alkhudaydi |
An exploration of deep-learning based phenotypic analysis to detect spike regions in field conditions for UK bread wheat |
Plant Phenomics 2019, 2019 |
2019 |
Computer science |
Tahani Alkhudaydi |
Counting spikelets from infield wheat crop images using fully convolutional networks |
Neural Computing and Applications, 2022 |
2022 |
Computer science |
Onytra Abbass |
Detecting Server-Side Request Forgery (SSRF) Attack by using Deep Learning Techniques |
International Journal of Advanced Computer Science and Applications(IJACSA …, 2021 |
2021 |
Computer science |
Mohammad Hijji |
A multivocal literature review on growing social engineering based cyber-attacks/threats during the COVID-19 pandemic: challenges and prospective solutions |
Ieee Access 9, 7152-7169, 2021 |
2021 |
Computer science |
Mohammad Hijji |
Human Inertial Thinking Strategy: A Novel Fuzzy Reasoning Mechanism for IoT-Assisted Visual Monitoring |
IEEE Internet of Things Journal, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Efficient Short-Term Electricity Load Forecasting for Effective Energy Management |
Sustainable Energy Technologies and Assessments 53, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Face recognition based on statistical features and SVM classifier |
Multimedia Tools and Applications 81 (6), 8767-8784, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Learning to rank: An intelligent system for person reidentification |
International Journal of Intelligent Systems, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Deep Learning-Based Diagnosis of Alzheimer’s Disease |
Journal of Personalized Medicine, 12, 815, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Controllable Model Compression for Roadside Camera Depth Estimation |
IEEE Transactions on Intelligent Transportation Systems, 1 - 8, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Enhancing topic clustering for Arabic security news based on k‐means and topic modelling |
IET Networks 10 (6), 278-294, 2021 |
2021 |
Computer science |
Mohammad Hijji |
Facial Expressions Recognition with Multi-region Divided Attention Networks for Smart Education Cloud Applications |
Neurocomputing, 2022 |
2022 |
Computer science |
Mohammad Hijji |
WEENet: An Intelligent System for Diagnosing COVID-19 and Lung Cancer in IoMT Environments |
Frontiers in Oncology, 5410, 2021 |
2021 |
Computer science |
Mohammad Hijji |
EADN: An Efficient Deep Learning Model for Anomaly Detection in Videos |
Mathematics 10 (9), 1555, 2022 |
2022 |
Computer science |
Mohammad Hijji |
PMAL: A proxy model active learning approach for vision based industrial applications |
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2022 |
2022 |
Computer science |
Mohammad Hijji |
A Comprehensive Review on Vision-based Violence Detection in Surveillance Videos |
ACM Computing Surveys, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security |
Mathematics 10 (12), 2054, 2022 |
2022 |
Computer science |
Mohammad Hijji |
It’s Your Turn, Are You Ready to Get Vaccinated? Towards an Exploration of Vaccine Hesitancy Using Sentiment Analysis of Instagram Posts |
Mathematics 10 (22), 4165, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Real-Time Medical Data Security Solution for Smart Healthcare |
IEEE Transactions on Industrial Informatics, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Vision-Based Semantic Segmentation in Scene Understanding for Autonomous Driving: Recent Achievements, Challenges, and Outlooks |
IEEE Transactions on Intelligent Transportation Systems, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Adaptive Color Image Encryption Scheme Based on Multiple Distinct Chaotic Maps and DNA Computing |
Mathematics 10 (12), 2004, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Multilingual Sentiment Mining System to Prognosticate Governance |
Computers, Materials & Continua, 2021 |
2021 |
Computer science |
Mohammad Hijji |
A comprehensive survey on deep facial expression recognition: challenges, applications, and future guidelines |
Alexandria Engineering Journal 68, 817-840, 2023 |
2023 |
Computer science |
Mohammad Hijji |
Visual Appearance and Soft Biometrics Fusion for Person Re-identification using Deep Learning |
IEEE Journal of Selected Topics in Signal Processing, 2023 |
2023 |
Computer science |
Mohammad Hijji |
Common Mental Disorders in Smart City Settings and Use of Multimodal Medical Sensor Fusion to Detect Them |
Diagnostics 13 (6), 1082, 2023 |
2023 |
Computer science |
Mohammad Hijji |
A hybrid data collection scheme to achieve load balancing for underwater sensor networks |
Journal of King Saud University-Computer and Information Sciences 35 (3), 74-86, 2023 |
2023 |
Computer science |
Mohammad Hijji |
FADS: An Intelligent Fatigue and Age Detection System |
Mathematics 11 (5), 1174, 2023 |
2023 |
Computer science |
Mohammad Hijji |
Intelligent Image Super-Resolution for Vehicle License Plate in Surveillance Applications |
Mathematics 11 (4), 892, 2023 |
2023 |
Computer science |
Mohammad Hijji |
ACSN: Attention capsule sampling network for diagnosing COVID-19 based on chest CT scans |
Computers in Biology and Medicine 153, 106338, 2023 |
2023 |
Computer science |
Mohammad Hijji |
6G Connected Vehicle Framework to Support Intelligent Road Maintenance Using Deep Learning Data Fusion |
IEEE Transactions on Intelligent Transportation Systems, 2023 |
2023 |
Computer science |
Mohammad Hijji |
Performance Evaluation of Different Decision Fusion Approaches for Image Classification |
Applied Sciences 13 (2), 1168, 2023 |
2023 |
Computer science |
Mohammad Hijji |
A Symbols Based BCI Paradigm for Intelligent Home Control Using P300 Event-Related Potentials |
Sensors 22 (24), 10000, 2022 |
2022 |
Computer science |
Mohammad Hijji |
A Multi-Layer Holistic Approach for Cursive Text Recognition |
Applied Sciences 12 (24), 12652, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Cybersecurity Awareness and Training (CAT) Framework for Remote Working Employees |
Sensors 22 (22), 8663, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Cloud Servers: Resource Optimization Using Different Energy Saving Techniques |
Sensors 22 (21), 8384, 2022 |
2022 |
Computer science |
Mohammad Hijji |
RBWCI: Robust and Blind Watermarking Framework for Cultural Images |
IEEE Transactions on Consumer Electronics, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Spatial Domain-Based Robust Watermarking Framework for Cultural Images |
IEEE Access 10, 117248-117260, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Scalable priority-based resource allocation scheme for M2M communication in LTE/LTE-A network |
Computers and Electrical Engineering 103, 108321, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Efficient Fire Segmentation for Internet-of-Things-Assisted Intelligent Transportation Systems |
IEEE Transactions on Intelligent Transportation Systems, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Defending Adversarial Examples by a Clipped Residual U-Net Model |
Intelligent Automation & Soft Computing 35, 2237–2256, 2022 |
2022 |
Computer science |
Mohammad Hijji |
Optimizing Energy Conservation in V2X Communications for 5G Networks |
CMC-COMPUTERS MATERIALS & CONTINUA 71 (2), 3479-3495, 2022 |
2022 |
Computer science |
Emad Alharbi |
Buccaneer model building with neural network fragment selection |
Acta Crystallographica Section D: Structural Biology 79 (4), 2023 |
2023 |
Information technology |
Narmatha C |
Breast cancer classification using Deep Q Learning (DQL) and gorilla troops optimization (GTO) |
Applied Soft Computing, 110292, 2023 |
2023 |
Computer science |
Bandar Alotaibi |
Utilizing Blockchain to Overcome Cyber Security Concerns in the Internet of Things: A Review |
IEEE Sensors Journal 19 (23), 10953 - 10971, 2019 |
2019 |
Information technology |
Bandar Alotaibi |
Distracted Driver Classification Using Deep Learning |
Signal, Image and Video Processing 14 (3), 617–624, 2020 |
2020 |
Information technology |
Bandar Alotaibi |
A Hybrid Deep ResNet and Inception Model for Hyperspectral Image Classification |
PFG – Journal of Photogrammetry, Remote Sensing and Geoinformation Science, 2020 |
2020 |
Information technology |
Bandar Alotaibi |
A Stacked Deep Learning Approach for IoT Cyber Attack Detection |
Journal of Sensors, 2020 |
2020 |
Information technology |
Bandar Alotaibi |
A Multichannel Deep Learning Framework for Cyberbullying Detection on Social Media |
Electronics 10 (21), 2664, 2021 |
2021 |
Information technology |
Bandar Alotaibi |
Energy-efficient and secure mobile fog-based cloud for the Internet of Things |
Future Generation Computer Systems 127, 1-13, 2022 |
2022 |
Information technology |
Bandar Alotaibi |
Improved Support Vector Machine Enabled Radial Basis Function and Linear Variants for Remote Sensing Image Classification |
Sensors, 2021 |
2021 |
Information technology |
Bandar Alotaibi |
Privacy preservation Models for Third-Party Auditor over Cloud Computing: a Survey |
Electronics 10 (21), 2721, 2021 |
2021 |
Information technology |
Bandar Alotaibi |
Consensus and Majority Vote Feature Selection Methods and a Detection Technique for Web Phishing |
Journal of Ambient Intelligence and Humanized Computing, 2021 |
2021 |
Information technology |
Bandar Alotaibi |
Transportation Mode Detection by Embedded Sensors Based on Ensemble Learning |
IEEE Access 8, 145552 - 145563, 2020 |
2020 |
Information technology |
Bandar Alotaibi |
Blockchain-enabled Deep Recurrent Neural Network Model for Clickbait Detection |
IEEE Access, 2021 |
2021 |
Information technology |
Bandar Alotaibi |
Detection of COVID-19 Using Deep Learning on X-ray Images |
Intelligent Automation & Soft Computing 29 (3), 885–898, 2021 |
2021 |
Information technology |
Bandar Alotaibi |
Hybrid Energy-Efficient Algorithm for Efficient Internet of Things Deployment |
Sustainable Computing: Informatics and Systems, 2022 |
2022 |
Information technology |
Bandar Alotaibi |
Clickbait detection using deep recurrent neural network |
Applied Sciences 12 (1), 504, 2022 |
2022 |
Information technology |
Bandar Alotaibi |
Anomaly detection paradigm for multivariate time series data mining for healthcare |
Applied Sciences 12 (17), 8902, 2022 |
2022 |
Information technology |
Bandar Alotaibi |
Deep Investigation of the Recent Advances in Dialectal Arabic Speech Recognition |
IEEE Access, 2022 |
2022 |
Information technology |
Bandar Alotaibi |
Big data handling approach for unauthorized cloud computing access |
Electronics 11 (1), 137, 2022 |
2022 |
Information technology |
Bandar Alotaibi |
Influence of COVID-19 Epidemic on Dark Web Contents |
Electronics 10 (22), 2744, 2021 |
2021 |
Information technology |
Bandar Alotaibi |
An Efficient Data-Balancing Cyber-physical System Paradigm for Quality-of-Service (QoS) Provision over Fog Computing |
Applied Sciences, 2021 |
2021 |
Information technology |
Bandar Alotaibi |
A blockchain-enabled framework for securing connected consumer electronics against wireless attacks |
Simulation Modelling Practice and Theory 121, 102652, 2022 |
2022 |
Information technology |
Bandar Alotaibi |
Continuous Mobile User Authentication Using a Hybrid CNN-Bi-LSTM Approach |
CMC-Computers, Materials & Continua, 2022 |
2022 |
Information technology |
Bandar Alotaibi |
Novel File-Checksum Method for Data Duplication Removal of Patients |
IEEE Eighth International Conference on Software Denied Systems (SDS), 2022 |
2022 |
Information technology |
Bandar Alotaibi |
Comparative Analysis of Digital Signature and Elliptic Curve Digital Signature Algorithms for the Validation of QR Code Vulnerabilities |
IEEE Eighth International Conference on Software Denied Systems (SDS), 2022 |
2022 |
Information technology |
Saad Almutairi |
Breast cancer classification using Deep Q Learning (DQL) and gorilla troops optimization (GTO) |
Applied Soft Computing, 110292, 2023 |
2023 |
Computer science |
Majed Aborokbah |
Breast cancer classification using Deep Q Learning (DQL) and gorilla troops optimization (GTO) |
Applied Soft Computing, 110292, 2023 |
2023 |
Computer science |
S.Manimurugan |
Breast cancer classification using Deep Q Learning (DQL) and gorilla troops optimization (GTO) |
Applied Soft Computing, 110292, 2023 |
2023 |
Information technology |
Mohammad Hijji |
Optimization of State of the Art Fuzzy-Based Machine Learning Techniques for Total Dissolved Solids Prediction |
Sustainability 15 (8), 7016, 2023 |
2023 |
Computer science |
Zaid Bassfar |
Effect of film thickness on structural, electrical and optical properties of amorphous boron subphthalocyanine chloride thin film |
Optical Materials 138, 113691, 2023 |
2023 |
Information technology |
Zaid Bassfar |
A Novel Cipher-Based Data Encryption with Galois Field Theory |
Sensors 23 (6), 3287, 2023 |
2023 |
Information technology |
Saad Almutairi |
An Intrusion Detection System Using BoT-IoT |
Applied Sciences 13 (9), 5427, 2023 |
2023 |
Computer science |
Wassim Messoudi |
A SLAM-based localization and navigation system for social robots: The pepper robot case |
Machines 11 (2), 158, 2023 |
2023 |
Computer science |
Wassim Messoudi |
A Systematic Approach for Exploring Underground Environment Using LiDAR-Based System |
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES 136 (3), 2321-2344, 2023 |
2023 |
Computer science |
Yousef Alfaifi |
Systematic Approach for Measuring Semantic Relatedness between Ontologies |
Electronics 12 (6), 1394, 2023 |
2023 |
Information technology |
Mohammad Ammad-udd M. Ashfaq |
Internet-of-Things (IoT)-based smart agriculture: Toward making the fields talk |
IEEE access 7, 129551-129583, 2019 |
2019 |
Computer science |
Mohammad Ammad-udd M. Ashfaq |
Wireless sensor’s civil applications, prototypes, and future integration possibilities: A review |
IEEE Sensors Journal 18 (1), 4-30, 2017 |
2017 |
Computer science |
Mohammad Ammad-udd M. Ashfaq |
UAV-assisted dynamic clustering of wireless sensor networks for crop health monitoring |
Sensors 18 (2), 555, 2018 |
2018 |
Computer science |
Mohammad Ammad-udd M. Ashfaq |
Wireless sensor network: A complete solution for poultry farming |
2014 IEEE 2nd International Symposium on Telecommunication Technologies …, 2014 |
2014 |
Computer science |
Mohammad Ammad-udd M. Ashfaq |
Smart agriculture applications using deep learning technologies: A survey |
Applied Sciences 12 (12), 5919, 2022 |
2022 |
Computer science |
Mohammad Ammad-udd M. Ashfaq |
UAV routing protocol for crop health management |
2016 24th European Signal Processing Conference (EUSIPCO), 1818-1822, 2016 |
2016 |
Computer science |
Mohammad Ammad-udd M. Ashfaq |
Cloud-connected flying edge computing for smart agriculture |
Peer-to-Peer Networking and Applications 14 (6), 3405-3415, 2021 |
2021 |
Computer science |
Mohammad Ammad-udd M. Ashfaq |
Sustainable seawater desalination: Current status, environmental implications and future expectations |
Desalination 540, 116022, 2022 |
2022 |
Computer science |
Mohammad Ammad-udd M. Ashfaq |
Affordable broad agile farming system for rural and remote area |
IEEE Access 7, 127098-127116, 2019 |
2019 |
Computer science |
Mohammad Ammad-udd M. Ashfaq |
Performance analysis of centralized, distributed and hybrid demand load control architecture for smart power grid |
IEEE International Conference on Electro-Information Technology, EIT 2013, 1-6, 2013 |
2013 |
Computer science |
Mohammad Ammad-udd M. Ashfaq |
Direction of arrival of narrowband signals based on virtual phased antennas |
23rd Asia-Pacific Conference on Communications (APCC), 2017 |
2017 |
Computer science |
Mohammad Ammad-udd M. Ashfaq |
A Hybrid Approach for the Detection and Classification of Tomato Leaf Diseases |
Applied Sciences 12 (16), 8182, 2022 |
2022 |
Computer science |
Mohammad Ammad-udd M. Ashfaq |
A hybrid data collection scheme to achieve load balancing for underwater sensor networks |
Journal of King Saud University-Computer and Information Sciences 35 (3), 74-86, 2023 |
2023 |
Computer science |
Mohammad Ammad-udd M. Ashfaq |
Ground target finding mechanism for unmanned aerial vehicles to secure crop field data |
Transactions on Emerging Telecommunications Technologies, e4210, 2020 |
2020 |
Computer science |
Osama Shibl Younes |
Securing ARP and DHCP for mitigating link layer attacks |
Sādhanā 42, 2041-2053, 2017 |
2017 |
Engineering |
Osama Shibl Younes |
Analysis of route stability in mobile multihop networks under random waypoint mobility |
IEEE Access 8, 168121-168136, 2020 |
2020 |
Engineering |
Osama Shibl Younes |
Federated deep learning for anomaly detection in the internet of things |
Computers and Electrical Engineering 108, 108651, 2023 |
2023 |
Engineering |
Osama Shibl Younes |
A Critical Review on Channel Modeling: Implementations, Challenges and Applications |
Electronics 12 (9), 2014, 2023 |
2023 |
Engineering |
Osama Shibl Younes |
Securing Session Initiation Protocol |
Sensors 22 (23), 9103, 2022 |
2022 |
Engineering |
Osama Shibl Younes |
Anomaly Detection using Network Metadata |
International Journal of Advanced Computer Science and Applications 13 (5), 2022 |
2022 |
Engineering |
Zaid Bassfar |
Chaos and Cellular Automata-Based Substitution Box and Its Application in Cryptography |
Mathematics 11 (10), 2322, 2023 |
2023 |
Information technology |
Zaid Bassfar |
A Finite State Machine-Based Improved Cryptographic Technique |
Mathematics 11 (10), 2225, 2023 |
2023 |
Information technology |
Slim BEN CHAABANE |
Face recognition based on statistical features and SVM classifier |
Multimedia Tools and Applications 81 (6), 8767-8784, 2022 |
2022 |
Engineering |
Slim BEN CHAABANE |
Face Recognition based on Convolution Neural Network and Scale Invariant Feature Transform |
International Journal of Advanced Computer Science and Applications 12 (2), 2021 |
2021 |
Engineering |
Slim BEN CHAABANE |
Color Edge Detection Using Multidirectional Sobel Filter and Fuzzy Fusion |
CMC JOURNAL 120 (2022), 11, 2022 |
2022 |
Engineering |
Amer Aljaedi |
A Novel Approach for Security Enhancement of Data Encryption Standard |
Computers, Materials & Continua 75 (3), 5073–5086, 2023 |
2023 |
Information technology |
Umar Albalawi |
A Critical Review on Channel Modeling: Implementations, Challenges and Applications |
Electronics 12 (9), 2014, 2023 |
2023 |
Information technology |
Rafika HARRABI |
Face recognition based on statistical features and SVM classifier |
Multimedia Tools and Applications 81 (6), 8767-8784, 2022 |
2022 |
Engineering |
Rafika HARRABI |
Face Recognition based on Convolution Neural Network and Scale Invariant Feature Transform |
International Journal of Advanced Computer Science and Applications 12 (2), 2021 |
2021 |
Engineering |
Rafika HARRABI |
FADS: An Intelligent Fatigue and Age Detection System |
Mathematics 11 (5), 1174, 2023 |
2023 |
Engineering |
Rafika HARRABI |
Intelligent Image Super-Resolution for Vehicle License Plate in Surveillance Applications |
Mathematics 11 (4), 892, 2023 |
2023 |
Engineering |
Lubna A. Alharbi |
Using Machine Learning Algorithm as a Method for Improving Stroke Prediction |
|
2023 |
Information technology |
Muhammad Ayaz |
Optimization of State of the Art Fuzzy-Based Machine Learning Techniques for Total Dissolved Solids Prediction |
Sustainability 15 (8), 7016, 2023 |
2023 |
Information technology |
Muhammad Ayaz |
Probability Based Regression Analysis for the Prediction of Cardiovascular Diseases |
Computers, Materials & Continua 75 (3), 2023 |
2023 |
Information technology |
Mohammed Alotaibi |
Employing Social Robots for Managing Diabetes Among Children: SARA |
Wireless Personal Communications, 1-20, 2023 |
2023 |
Information technology |
Tahani Alkhudaydi |
Deep Learning for Combined Water Quality Testing and Crop Recommendation |
International Journal of Advanced Computer Science and Applications 14 (4), 2023 |
2023 |
Computer science |
Mohammed Alotaibi |
An Investigation of Asthma Experiences in Arabic Communities Through Twitter Discourse |
|
|
Information technology |
Saleh Albelwi |
Automatic Team Assignment and Jersey Number Recognition in Football Videos |
INTELLIGENT AUTOMATION AND SOFT COMPUTING 36 (3), 2669-2684, 2023 |
2023 |
Computer science |
Mohammad Hijji |
Energy Cost Minimization Using String Matching Algorithm in Geo-Distributed Data Centers |
|
|
Computer science |
Hind Saleh Alatawi |
Detection of Hate Speech using BERT and Hate Speech Word Embedding with Deep Model |
Applied Artificial Intelligence 37, 2166719, 2023 |
2023 |
Computer science |
Lubna A. Alharbi |
Artificial Rabbits Optimizer with Machine Learning based Emergency Department Monitoring and Medical Data Classification at KSA Hospitals |
IEEE Access, 2023 |
2023 |
Information technology |
Muhammad Ayaz |
A Critical Review on Corrosion and Fouling of Water in Water Distribution Networks and Their Control |
Acta Chimica Slovenica, 173-183, 2023 |
2023 |
Information technology |
Zaid Bassfar |
Toward Secure and Resilient Networks: A Zero-Trust Security Framework with Quantum Fingerprinting for Devices Accessing Network |
Mathematics 11 (12), 2653, 2023 |
2023 |
Information technology |
Adel R. Alharbi |
The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based Vulnerabilities |
Electronics 12 (12), 2664, 2023 |
2023 |
Information technology |
Adel R. Alharbi |
Area-Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications |
Applied Sciences 13 (12), 7018, 2023 |
2023 |
Information technology |
Amer Aljaedi |
The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based Vulnerabilities |
Electronics 12 (12), 2664, 2023 |
2023 |
Information technology |
Amer Aljaedi |
Area-Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications |
Applied Sciences 13 (12), 7018, 2023 |
2023 |
Information technology |
Ahmed .M Alwakeel |
A Heuristic Deep Q Learning for Offloading in Edge Devices in 5 g Networks |
Journal of Grid Computing 21 (3), 37, 2023 |
2023 |
Information technology |
Ahmed .M Alwakeel |
Cyber Physical System for Distributed Network Using DoS Based Hierarchical Bayesian Network |
Journal of Grid Computing 21 (2), 27, 2023 |
2023 |
Information technology |
Ibrahim Sulaiman Alkhazi |
Smartphone User Identification/Authentication Using Accelerometer and Gyroscope Data |
Sustainability 15 (13), 10456, 2023 |
2023 |
Computer science |
Ahamed Aljuhani |
Deep-Learning-Based Blockchain for Secure Zero Touch Networks |
IEEE Communications Magazine 61 (2), 96-102, 2022 |
2022 |
Information technology |
Ahamed Aljuhani |
Anomaly detection for process monitoring based on machine learning technique |
Neural Computing and Applications 35 (5), 4073-4097, 2023 |
2023 |
Information technology |
A'aeshah Alhakamy |
Augmented Reality-Assisted Deep Reinforcement Learning-Based Model towards Industrial Training and Maintenance for NanoDrop Spectrophotometer |
Sensors 23 (13), 6024, 2023 |
2023 |
Computer science |
Lubna A. Alharbi |
A Heuristic Deep Q Learning for Offloading in Edge Devices in 5 g Networks |
Journal of Grid Computing 21 (3), 37, 2023 |
2023 |
Information technology |
Narmatha C |
A combination of DenseNet-264 with alternating decision tree for detecting lung infection |
Soft Computing, 1-11, 2023 |
2023 |
Computer science |
Mohammad Ammad-udd M. Ashfaq |
Performance analysis of centralized, distributed and hybrid Demand Load control architecture for smart power grid |
2013 IEEE Energytech, 1-6, 2013 |
2013 |
Computer science |
Mohammed Alwakeel |
A Heuristic Deep Q Learning for Offloading in Edge Devices in 5 g Networks |
Journal of Grid Computing 21 (3), 37, 2023 |
2023 |
Engineering |
Bandar Alotaibi |
A Data-Science Approach for Creation of a Comprehensive Model to Assess the Impact of Mobile Technologies on Humans |
Applied Sciences 13 (6), 3600, 2023 |
2023 |
Information technology |
Bandar Alotaibi |
Big Data Handling Approach for Unauthorized Access of Cloud Computing |
Preprints, 2021 |
2021 |
Information technology |
Zaid Bassfar |
Inverse Graphs in m-Polar Fuzzy Environments and Their Application in Robotics Manufacturing Allocation Problems with New Techniques of Resolvability |
Symmetry 15 (7), 1387, 2023 |
2023 |
Information technology |
Ahmed .M Alwakeel |
Performance Analysis of a Keyword-Based Trust Management System for Fog Computing |
Applied Sciences 13 (15), 8714, 2023 |
2023 |
Information technology |
Muhammad Ayaz |
Fractional-Order Model-Free Predictive Control for Voltage Source Inverters |
Fractal and Fractional 7 (6), 433, 2023 |
2023 |
Information technology |
Muhammad Ayaz |
IoT-Based Smart Surveillance System for High-Security Areas |
Applied Sciences 13 (15), 8936, 2023 |
2023 |
Information technology |
Muhammad Ayaz |
Advanced Topics and Smart Systems for Wireless Communications and Networks |
Sensors 23 (15), 6876, 2023 |
2023 |
Information technology |
Slim BEN CHAABANE |
A 3D Processing Technique to Detect Lung Tumor |
International Journal of Advanced Computer Science and Applications 14 (6), 2023 |
2023 |
Engineering |
Tareq Alhmiedat |
Efficacy of Emerging Technologies to Manage Childhood Obesity [Corrigendum] |
Diabetes, Metabolic Syndrome and Obesity 16, 2537-2538, 2023 |
2023 |
Information technology |
Mohammed Alotaibi |
Efficacy of Emerging Technologies to Manage Childhood Obesity [Corrigendum] |
Diabetes, Metabolic Syndrome and Obesity 16, 2537-2538, 2023 |
2023 |
Information technology |
Ahamed Aljuhani |
An enhanced CAD system based on machine Learning Algorithm for brain MRI classification |
Journal of Intelligent & Fuzzy Systems 41 (1), 1845-1854, 2021 |
2021 |
Information technology |
Yousef Alfaifi |
Multilayered gold, MgF2 and tungsten based ultra wide band infrared absorber for solar cell applications |
Materials Chemistry and Physics 301, 127680, 2023 |
2023 |
Information technology |