Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A review of recent advances on multimedia watermarking security and design implications for digital Quran computing., and . ISBAST, page 304-309. IEEE, (2014)Technical Issues on Cognitive Radio-Based Internet of Things Systems: A Survey., , , and . IEEE Access, (2019)Thesholding and Character Recognition in Security Documents with Watermarked Background.. DICTA, page 220-225. IEEE Computer Society, (2008)Authentication and Tamper Detection of Digital Holy Quran Images., , , and . ISBAST, page 291-296. IEEE, (2013)Analysis of a Transportation System With Correlated Network Intersections: A Case Study for a Central Urban City With High Seasonal Fluctuation Trends., , , and . IEEE Access, (2017)Modeling Lung Functionality in Volume-Controlled Ventilation for Critical Care Patients., , , , , and . IICAIET, page 1-4. IEEE, (2020)A survey on Arabic character segmentation.. Int. J. Document Anal. Recognit., 16 (2): 105-126 (2013)Quran search engines: challenges and design requirements.. Int. J. Comput. Appl. Technol., 57 (3): 237-245 (2018)Lie group analysis and numerical solution of magnetohydrodynamic free convective slip flow of micropolar fluid over a moving plate with heat transfer., , and . Comput. Math. Appl., 70 (5): 846-856 (2015)Numerical solutions for gyrotactic bioconvection in nanofluid-saturated porous media with Stefan blowing and multiple slip effects., , , and . Comput. Math. Appl., 72 (10): 2562-2581 (2016)