Search

Your search keyword '"Omar M. Ba-Rukab"' showing total 39 results

Search Constraints

Start Over You searched for: Author "Omar M. Ba-Rukab" Remove constraint Author: "Omar M. Ba-Rukab"
39 results on '"Omar M. Ba-Rukab"'

Search Results

2. Performance analysis of 40 Gb/s free space optics transmission based on orbital angular momentum multiplexed beams

3. Majorization Results for Certain Subfamilies of Analytic Functions

4. Sharp Bounds of the Coefficient Results for the Family of Bounded Turning Functions Associated with a Petal-Shaped Domain

5. Intelligent Socio-Emotional Control of Pedestrian Crowd behaviour inside Smart City

6. The Number of Confirmed Cases of Covid-19 by using Machine Learning: Methods and Challenges

7. Fuzzy Integral-Based Multi-Classifiers Ensemble for Android Malware Classification

8. iSulfoTyr-PseAAC: Identify Tyrosine Sulfation Sites by Incorporating Statistical Moments via Chou’s 5-steps Rule and Pseudo Components

9. Autonomous framework simulation tools for real-time multimedia streaming over wireless ad-hoc networks

10. A Novel Approach to Identify the Categories of Attributes for the Three-Factor Structure in Customer Satisfaction

11. Intelligence Context Aware Mobile Navigation using Augmented Reality Technology

12. Map Calculation of the Shapley-Shubik Voting Powers: An Example of the European Economic Community

14. Android malware classification based on ANFIS with fuzzy c-means clustering using significant application permissions

15. Advances in Mathematics and Computer Science Vol. 2

16. A New Approach to Fuzzy TOPSIS Method Based on Entropy Measure under Spherical Fuzzy Information

17. A Traffic Congestion Framework for Smart Riyadh City based on IoT Services

18. Identification of hub genes and their SNP analysis in West Nile virus infection for designing therapeutic methodologies using RNA-Seq data

19. Model trees and sequential minimal optimization based support vector machine models for estimating minimum surface roughness value

20. Intelligent Hybrid Approach for Android Malware Detection based on Permissions and API Calls

21. SWITCHING-ALGEBRAIC ANALYSIS OF RELATIONAL DATABASES

23. Minimizing Denial of Service Attack for Multiple Base Stations in Wireless Sensor Network

24. From Symmetric Nets to Differential Equations exploiting Model Symmetries

26. Secure Communication using Symmetric and Asymmetric Cryptographic Techniques

27. Semantic data mapping technology to solve semantic data problem on heterogeneity aspect

28. Powerful Features of the Modern Syllogistic Method of Propositional Logic

29. A purely map procedure for two-level multiple-output logic minimization

30. Use of Flow Equivalent Servers in the Transient Analysis of Product Form Queuing Networks

32. Fault-tree modelling of computer system security

33. Two-Level Multiple-Output Logic Minimization Using A Single Function

34. Real Time Interactive Presentation Apparatus based on Depth Image Recognition

35. In silico analysis of detrimental mutation in EPHB2 gene causing Alzheimer’s disease

36. Constructing Matrix Exponential Distributions by Moments and Behavior around Zero

37. Reducing Flooding of Zone Routing Protocol in Mobile Ad-Hoc Networks

38. Binomial schedule for an M/G/1 queueing system with an unreliable server

39. A versatile mathematical work-flow to explore how Cancer Stem Cell fate influences tumor progression

Catalog

Books, media, physical & digital resources