From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cyber Security Crime and Punishment: Comparative Study of the Laws of Jordan, Kuwait, Qatar, Oman, and Saudi Arabia., , , и . Int. J. Cyber Warf. Terror., 8 (3): 46-59 (2018)Cyber Security Body of Knowledge and Curricula Development, , , и . Reimagining New Approaches in Teacher Professional Development, InTech, (октября 2018)Correction: Convolution Neural Network Bidirectional Long Short-Term Memory for Heartbeat Arrhythmia Classification., , , , , , , и . Int. J. Comput. Intell. Syst., 17 (1): 38 (декабря 2024)Innovative Insect Detection and Classification for the Agricultural Sector Using Gannet Optimization Algorithm With Deep Learning., , , , , и . IEEE Access, (2024)Tuna Swarm Algorithm With Deep Learning Enabled Violence Detection in Smart Video Surveillance Systems., , , , , и . IEEE Access, (2023)An Enhanced Fault Tolerance Algorithm for Optical Mark Recognition Using Smartphone Cameras., , , и . IEEE Access, (2024)Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems., , , , , , , и . Clust. Comput., 26 (3): 2085-2098 (2023)Convolution Neural Network Bidirectional Long Short-Term Memory for Heartbeat Arrhythmia Classification., , , , , , , и . Int. J. Comput. Intell. Syst., 16 (1): 197 (декабря 2023)Dynamic offloading strategy for computational energy efficiency of wireless power transfer based MEC networks in industry 5.0., , , , , , , и . J. King Saud Univ. Comput. Inf. Sci., 35 (10): 101841 (декабря 2023)