Search

Your search keyword '"Harous, Saad"' showing total 85 results

Search Constraints

Start Over You searched for: Author "Harous, Saad" Remove constraint Author: "Harous, Saad" Database Complementary Index Remove constraint Database: Complementary Index
85 results on '"Harous, Saad"'

Search Results

1. A comparative study of the performance of ten metaheuristic algorithms for parameter estimation of solar photovoltaic models.

2. Generative Artificial Intelligence for Cyber Security: Literature Review and Challenges.

4. BHJO: A Novel Hybrid Metaheuristic Algorithm Combining the Beluga Whale, Honey Badger, and Jellyfish Search Optimizers for Solving Engineering Design Problems.

5. A comparative study of energy routing algorithms to optimize energy transmission in energy internet.

6. Double firefly based efficient clustering for large-scale wireless sensor networks.

7. Roadmap of Adversarial Machine Learning in Internet of Things-Enabled Security Systems.

8. A Comprehensive Evaluation of Machine Learning Algorithms for Web Application Attack Detection with Knowledge Graph Integration.

9. Inference Analysis of Video Quality of Experience in Relation with Face Emotion, Video Advertisement, and ITU-T P.1203.

10. HCEL: Hybrid Clustering Approach for Extending WBAN Lifetime.

11. Comparative analysis of Deep Learning and Machine Learning algorithms for emoji prediction from Arabic text.

12. Blockchain-based multi-diagnosis deep learning application for various diseases classification.

13. Collaborative Cloud-V. Edge System for Predicting Traffic Accident Risk Using Machine Learning Based IOV.

15. Recent Reinforcement Learning and Blockchain Based Security Solutions for Internet of Things: Survey.

16. Survey of Personalized Learning Software Systems: A Taxonomy of Environments, Learning Content, and User Models.

17. Improving consistency of AADL models: A composition approach.

18. A Systematic Literature Review of Blockchain Technology for Internet of Drones Security.

20. A Study on Predicting the Outbreak of COVID-19 in the United Arab Emirates: A Monte Carlo Simulation Approach.

21. Improved bio-inspired security scheme for privacy-preserving in the internet of things.

22. Robust Connectivity-Based Internet of Vehicles Clustering Algorithm.

24. A Collision-Free Scheduling Algorithm with Minimum Data Redundancy Transmission for TSCH.

25. ACOMAR: ACO‐based MAC‐aware routing protocol.

26. Robustness improvement of component-based cloud computing systems.

27. The Archerfish Hunting Optimizer: A Novel Metaheuristic Algorithm for Global Optimization.

28. Smart-Approach Based Internet of Things and Skyline Query for Multicriteria Decisions for Travel Services.

29. A Cognitive Style Based Framework for Usability Evaluation of Online Lecturing Platforms - A Case Study on Zoom and Teams.

30. Customized Rule-Based Model to Identify At-Risk Students and Propose Rational Remedial Actions.

32. Modelling and verification of parameterized architectures: A functional approach.

33. A Novel Quantum Firefly Algorithm for Global Optimization.

34. Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure.

35. A Survey on Various Methods and Algorithms of Scheduling in Fog Computing.

36. DCA-DS: A Distributed Clustering Algorithm Based on Dominating Set for Internet of Vehicles.

37. A Semi-supervised Deep Auto-encoder Based Intrusion Detection for IoT.

38. Survey on vehicular ad hoc networks clustering algorithms: Overview, taxonomy, challenges, and open research issues.

39. Vehicular Cloud Computing Security: A Survey.

40. Mining Web Analytics Data for Information Wikis to Evaluate Informal Learning.

41. TOWARDS A DISTRIBUTED SOLUTION TO MULTI-ROBOT TASK ALLOCATION PROBLEM WITH ENERGETIC AND SPATIOTEMPORAL CONSTRAINTS.

42. A New Heuristic Clustering Algorithm Based on RSU for Internet of Vehicles.

43. FA–QABC–MRTA: a solution for solving the multi-robot task allocation problem.

44. Energy-efficient MAC protocols for wireless sensor networks: a survey.

45. A Review of Security in Internet of Things.

46. Game of Streaming Players: Is Consensus Viable or an Illusion?

47. Data stream mining techniques: a review.

48. A review of routing protocols in internet of vehicles and their challenges.

49. Improving Wireless Sensor Networks Durability Through Efficient Sink Motion Strategy: TMSRP.

50. Challenges and research directions for Internet of Things.

Catalog

Books, media, physical & digital resources