Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Bidirectional Long Short-Term Memory and Conditional Random Fields for Labeling Arabic Named Entities: A Comparative Study., , , and . SNAMS, page 135-140. IEEE, (2018)An intrusion detection system for connected vehicles in smart cities., , , and . Ad Hoc Networks, (2019)Multicast Optimization for CLOS Fabric in Media Data Centers., , , , , and . IEEE Trans. Network and Service Management, 16 (4): 1855-1868 (2019)Enabling multiple health security threats detection using mobile edge computing., , , and . Simul. Model. Pract. Theory, (2020)A Multi-Hop Multicasting Routing Protocol for Cognitive Radio Networks., , , , and . Ad Hoc Sens. Wirel. Networks, 39 (1-4): 239-259 (2017)Intelligent jamming-aware routing in multi-hop IoT-based opportunistic cognitive radio networks., , , , , and . Ad Hoc Networks, (2020)An Effective Recommender System Based on Clustering Technique for TED Talks., , and . Int. J. Inf. Technol. Web Eng., 15 (1): 35-51 (2020)Privacy Management in Social Internet of Vehicles: Review, Challenges and Blockchain Based Solutions., , , , and . IEEE Access, (2019)An efficient employment of internet of multimedia things in smart and future agriculture., , , , and . Multim. Tools Appl., 78 (20): 29581-29605 (2019)Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques., , , , and . Multim. Tools Appl., 78 (4): 3961-3977 (2019)