Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supervised Semantic Analysis of Product Reviews Using Weighted k-NN Classifier., , and . ITNG, page 502-507. IEEE Computer Society, (2014)A Pattern-Based Multi-Factor Authentication System., , , and . Scalable Comput. Pract. Exp., 20 (1): 101-112 (2019)Topology Optimization of Fluidic Pressure Loaded Structures and Compliant Mechanisms using the Darcy Method., , and . CoRR, (2019)Empirical Evaluation of Hill Climbing Algorithm., and . Int. J. Appl. Metaheuristic Comput., 8 (4): 27-40 (2017)PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities., , , , , , and . IEEE Trans. Netw. Sci. Eng., 8 (3): 2326-2341 (2021)A comprehensive survey on trajectory schemes for data collection using mobile elements in WSNs., and . J. Ambient Intell. Humaniz. Comput., 11 (1): 291-312 (2020)Spam Review Detection Using Ensemble Machine Learning., , , and . MLDM (2), volume 10935 of Lecture Notes in Computer Science, page 198-209. Springer, (2018)Predicting Stock Movements using Social Network., , and . I3E, volume 9844 of Lecture Notes in Computer Science, page 567-572. Springer, (2016)Understanding the Adoption of Mobile Internet in the Saudi Arabian Context: Results from a Descriptive Analysis., , , and . I3E, volume 9373 of Lecture Notes in Computer Science, page 95-106. Springer, (2015)Firefly: illuminating future network-on-chip with nanophotonics., , , , , and . ISCA, page 429-440. ACM, (2009)