Author of the publication

Arabic Cursive Characters Distributed Recognition using the DTW Algorithm on BOINC : Performance Analysis

, , and . IJACSA - International Journal of Advanced Computer Science and Applications, 2 (3): 75--79 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XtremDew: a platform for cooperative tasks and data schedulers., , , , and . Int. J. High Perform. Comput. Netw., 16 (1): 55-66 (2020)Towards an agent based framework for the design of secure web services., , and . SWS, page 81-86. ACM, (2008)Towards a Better Security in Public Cloud Computing., , and . HIS, volume 1179 of Advances in Intelligent Systems and Computing, page 441-453. Springer, (2019)Co-scheduling Data and Task for a Data-Driven Distribution of Data-Intensive Applications., , and . AICCSA, page 407-414. IEEE Computer Society, (2017)Mitigation of Sybil Attacks in Structured P2P Overlay Networks., and . SKG, page 245-248. IEEE Computer Society, (2012)A Blockchain Oracle Interoperability Technique for Permissioned Blockchain., , , and . IEEE Access, (2024)Towards trusted volunteer grid environments, and . CoRR, (2010)Database for Arabic Printed Text Recognition Research., , , , and . ICIAP (1), volume 8156 of Lecture Notes in Computer Science, page 251-259. Springer, (2013)Securing Structured P2P Overlay Networks., and . 3PGCIC, page 37-43. IEEE, (2013)A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks., and . AICCSA, page 128-134. IEEE Computer Society, (2017)