Author of the publication

Social Media Acceptance and Use Among University Students for Learning Purpose Using UTAUT Model.

, , , , , and . ISAT (1), volume 1050 of Advances in Intelligent Systems and Computing, page 91-102. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating the Roles of Effective Communication Among Stakeholders in Collaborative Software Development Projects., , , , and . ICCSA (6), volume 12254 of Lecture Notes in Computer Science, page 311-319. Springer, (2020)Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data., , , and . Algorithms, 15 (10): 373 (2022)Blockchain-Based Framework for Secure Transaction in Mobile Banking Platform., , , , and . HIS, volume 1375 of Advances in Intelligent Systems and Computing, page 525-534. Springer, (2020)Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions., , , , and . Inf., 13 (10): 442 (2022)Augmented Intelligence Multilingual Conversational Service for Smart Enterprise Management Software., , , , , and . ICCSA (Workshops 5), volume 13381 of Lecture Notes in Computer Science, page 476-488. Springer, (2022)Heart Disease Classification Using Machine Learning Models., , , , and . ICIIA, volume 1547 of Communications in Computer and Information Science, page 35-49. Springer, (2021)Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach., , , , , and . Multim. Tools Appl., 82 (13): 20537-20551 (May 2023)Prediction of Students performance with Artificial Neural Network using Demographic Traits., , , , and . CoRR, (2021)A Deep Learning-Based Intrusion Detection Technique for a Secured IoMT System., , , , and . ICIIA, volume 1547 of Communications in Computer and Information Science, page 50-62. Springer, (2021)Applicability of MMRR load balancing algorithm in cloud computing., , , , and . Int. J. Comput. Math. Comput. Syst. Theory, 6 (1): 7-20 (2021)