Get my own profile
Public access
View all4 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Hossam FarisProfessor, The University of JordanVerified email at ju.edu.jo
- Ibrahim AljarahProfessor of Big Data Mining and Computational Intelligence, The University of JordanVerified email at ju.edu.jo
- Mohammad HassonahUniversity of JordanVerified email at fgs.ju.edu.jo
- Majdi MafarjaAssociate Professor of Computer Science, Birzeit UniversityVerified email at birzeit.edu
- Seyedali MirjaliliProfessor, Torrens University Australia, Obuda University, Griffith UniversityVerified email at griffith.edu.au
- Ja'far Alqatawna, Associate ProfessorUniversity of Jordan and Higher Colleges of TechnologyVerified email at ju.edu.jo
- Raneem QaddouraAssistant Professor of Artificial Intelligence and Data Science, Al Hussein Technical UniversityVerified email at htu.edu.jo
- Pedro A. Castillo-ValdiviesoUniversidad de GranadaVerified email at ugr.es
- Rizik M. H. Al-SayyedFull Professor at the University of JordanVerified email at ju.edu.jo
- Antonio MoraAssociate Professor at Dept. of Signal Theory, Telematics and Communications. University of GranadaVerified email at ugr.es
- Mohammed EshtayASAC, Luminus Technical University CollegeVerified email at fgs.ju.edu.jo
- Dr. Dana Al QudahAssociate Professor of Information Technology, University of JordanVerified email at ju.edu.jo
- Alaa ShetaComputer Science Department, Southern Connecticut State UniversityVerified email at southernct.edu
- Ali Safaa SadiqAssociate Professor in Cyber Security, Department of Computer Science, Nottingham Trent UniversityVerified email at ntu.ac.uk
- Ali Asghar HeidariPhD. Exceptionally Talented Researcher, School of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
- Maria HabibGranada University