Author of the publication

Understanding the Adoption of Mobile Internet in the Saudi Arabian Context: Results from a Descriptive Analysis.

, , , and . I3E, volume 9373 of Lecture Notes in Computer Science, page 95-106. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Anomalous Diffusion of Devices in Molecular Communication Systems., , , and . IEEE Trans. Mol. Biol. Multi Scale Commun., 8 (3): 207-211 (September 2022)Impacts of Unintended Nanomachine in Diffusion-Based Molecular Communication System., , , , and . IEEE Trans. Mol. Biol. Multi Scale Commun., 6 (3): 210-219 (2020)On Anomalous Diffusion of Devices in Molecular Communication Network., , , and . CoRR, (2022)FerroX: A GPU-accelerated, 3D phase-field simulation framework for modeling ferroelectric devices., , , , , and . Comput. Phys. Commun., (September 2023)Feature based video stabilization based on boosted HAAR Cascade and representative point matching algorithm., , , , , , and . Image Vis. Comput., (2020)RNN based online handwritten word recognition in Devanagari and Bengali scripts using horizontal zoning., , and . Pattern Recognit., (2019)A comparative study of robots in laparoscopic surgeries., and . AIR, page 14:1-14:6. ACM, (2019)Workspace Optimization of 3PRR Parallel manipulator for drilling operation using Genetic Algorithm., and . AIR, page 17:1-17:5. ACM, (2017)Android application behavioural analysis for data leakage., and . Expert Syst. J. Knowl. Eng., (2021)An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks., , and . Comput. Commun., (2021)