Biblio
“Design and Development of Bi-Directional IoT Gateway using ZigBee and Wi-Fi Technologies with MQTT Protocol”, Journal of Electronic Systems, vol. 8, no. 1, pp. 1-11, 2018.
, “Design and Development of Bi-Directional IoT Gateway using ZigBee and Wi-Fi Technologies with MQTT Protocol”, Journal of Electronic Systems, vol. 8, no. 1, pp. 1-11, 2018.
, “A Framework for Big Data Pre-processing and Search Optimization Using Hmga-aco: A Hierarchical Optimization Approach-”, Progress in Computing Applications, vol. 7, no. 1, pp. 10-25, 2018.
, “Fusion Model for Traffic Sign Detection, Tracking and Recognition”, Journal of Electronic Systems, vol. 8, no. 2, pp. 72-79, 2018.
, “GAIT Biometric Recognition Using Direct Classification, TSVM, SVM & Neural Network”, Journal of Information Organization, vol. 8, no. 1, pp. 1-7, 2018.
, “GAIT Biometric Recognition Using Direct Classification, TSVM, SVM & Neural Network”, Journal of Information Organization, vol. 8, no. 1, pp. 1-7, 2018.
, “Hybrid Multi-Criteria Decision Making Approach for Product Ranking Using Customers Reviews”, Journal of Data Processing, vol. 8, no. 1, pp. 1-17, 2018.
, “Intention to use Mobile Wallet: Extension of TAM Model”, Journal of Electronic Systems, vol. 8, no. 1, pp. 27-34, 2018.
, “Machine Learning in Predicting the Appropriate Model of Software Process Models Deviation-”, Journal of Digital Information Management, vol. 16, no. 6, pp. 308-323, 2018.
, “Machine Learning in Predicting the Appropriate Model of Software Process Models Deviation”, Journal of Digital Information Management, vol. 16, no. 6, pp. 308-323, 2018.
, “Mathematical Formulation for Programmers to Select Background and Foreground Colors in Designing Websites”, International Journal of Web Applications, vol. 10, no. 2, pp. 47-50, 2018.
, “New approach for intrusion detection in Big Data as a service in the Cloud-”, Journal of Digital Information Management, vol. 16, no. 5, pp. 258-270, 2018.
, “New approach for intrusion detection in Big Data as a service in the Cloud-”, Journal of Digital Information Management, vol. 16, no. 5, pp. 258-270, 2018.
, “New approach for intrusion detection in Big Data as a service in the Cloud”, Journal of Digital Information Management, vol. 16, no. 6, pp. 258-271, 2018.
, “New approach for intrusion detection in Big Data as a service in the Cloud”, Journal of Digital Information Management, vol. 16, no. 6, pp. 258-271, 2018.
, “A New Look at the TOR Anonymous Communication System”, Journal of Digital Information Management, vol. 16, no. 5, pp. 223-229, 2018.
, “A New Look at the TOR Anonymous Communication System-”, Journal of Digital Information Management, vol. 16, no. 5, pp. 223-229, 2018.
, “A Noise-Robust Image Encryption Algorithm Based on Hyper Chaotic Cellular Neural Network”, Journal of Digital Information Management, vol. 16, no. 5, pp. 246-257, 2018.
, “A Noise-Robust Image Encryption Algorithm Based on Hyper Chaotic Cellular Neural Network-”, Journal of Digital Information Management, vol. 15, no. 5, pp. 246-257, 2018.
, “Optimal Web Service Selection Model using Fuzzy Extended AHP and Weighted Sum Method”, Journal of Digital Information Management, vol. 16, no. 4, pp. 157-168, 2018.
, “Optimal Web Service Selection Model using Fuzzy Extended AHP and Weighted Sum Method-”, Journal of Digital Information Management, vol. 16, no. 4, pp. 157-168, 2018.
, “Application of the codes of a polynomial residue number system, aimed at reducing the effects of failures in the AES cipher”, Journal of Digital Information Management, vol. 14, no. 2, pp. 114 - 123, 2016.
, “Emonews: An emotional news recommender system”, Journal of Digital Information Management, vol. 14, no. 6, pp. 392 - 402, 2016.
, “A novel algorithm for classification rule discovery based on concept granule structure”, Journal of Digital Information Management, vol. 14, no. 2, pp. 73 - 80, 2016.
, “Plagiarism detection in Arabic documents: Approaches, architecture and systems”, Journal of Digital Information Management, vol. 14, no. 2, pp. 124 - 135, 2016.
,