Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Bidirectional Long Short-Term Memory and Conditional Random Fields for Labeling Arabic Named Entities: A Comparative Study., , , and . SNAMS, page 135-140. IEEE, (2018)An intrusion detection system for connected vehicles in smart cities., , , and . Ad Hoc Networks, (2019)Multicast Optimization for CLOS Fabric in Media Data Centers., , , , , and . IEEE Trans. Network and Service Management, 16 (4): 1855-1868 (2019)An Effective Recommender System Based on Clustering Technique for TED Talks., , and . Int. J. Inf. Technol. Web Eng., 15 (1): 35-51 (2020)Intelligent jamming-aware routing in multi-hop IoT-based opportunistic cognitive radio networks., , , , , and . Ad Hoc Networks, (2020)Enabling multiple health security threats detection using mobile edge computing., , , and . Simul. Model. Pract. Theory, (2020)A Multi-Hop Multicasting Routing Protocol for Cognitive Radio Networks., , , , and . Ad Hoc Sens. Wirel. Networks, 39 (1-4): 239-259 (2017)Trustworthy Cooperative UAV-Based Data Management in Densely Crowded Environments., , and . IEEE Commun. Stand. Mag., 5 (4): 18-24 (2021)Privacy Management in Social Internet of Vehicles: Review, Challenges and Blockchain Based Solutions., , , , and . IEEE Access, (2019)Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques., , , , and . Multim. Tools Appl., 78 (4): 3961-3977 (2019)