Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication systems: A literature review and classification., , , , and . Telematics Informatics, 35 (5): 1491-1511 (2018)Recent Fuzzy Generalisations of Rough Sets Theory: A Systematic Review and Methodological Critique of the Literature., , , , , and . Complex., (2017)Factors influencing cloud computing adoption for e-government implementation in developing countries: Instrument development., , and . J. Systems and IT, 18 (3): 297-327 (2016)Optimized feature selection method using particle swarm intelligence with ensemble learning for cancer classification based on microarray datasets., and . Neural Comput. Appl., 34 (16): 13513-13528 (2022)Analysis of Travellers' Online Reviews in Social Networking Sites Using Fuzzy Logic Approach., , , , , and . Int. J. Fuzzy Syst., 21 (5): 1367-1378 (2019)Cloud Computing Fitness for E-Government Implementation: Importance-Performance Analysis., , , and . IEEE Access, (2018)Multi-criteria decision making approach in E-learning: A systematic review and classification., , , , , , and . Appl. Soft Comput., (2016)Empirical Study on Secure Routing Protocols in Wireless Sensor Networks., , and . Int. J. Adv. Comp. Techn., 2 (5): 25-41 (2010)Integrated feedback control reporting for improving quality of technical service reporting in IT service management., , and . Telematics Informatics, 34 (8): 1736-1771 (2017)Quality of service acceptance in cloud service utilization: An empirical study in Palestinian higher education institutions., and . Educ. Inf. Technol., 25 (2): 863-888 (2020)