default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2024
- Faisal Saeed, Fathey Mohammed, Yousef Fazea:
Advances in Intelligent Computing Techniques and Applications - Intelligent Systems, Intelligent Health Informatics, Intelligent Big Data Analytics and Smart Computing, IRICT 2023, Johor Bahru, Malaysia, 18-19 December 2023, Volume 2. Lecture Notes on 211, Springer 2024, ISBN 978-3-031-59706-0 [contents] - 2023
- Ruah Mouad Alyas AL-Azzawi, Sufyan Salim Mahmood AL-Dabbagh:
Securing Data in IoT-RFID-Based Systems Using Lightweight Cryptography Algorithm. IRICT (2) 2023: 26-38 - Abdulaziz Alashbi, Abdul Hakim H. M. Mohamed, Ibraheem Shayea, Ayman A. El-Saleh, Abdul Ahad:
A Review of IoT Applications in Smart Environments: From Smart Cities to Military Integration. IRICT (2) 2023: 176-190 - Muaadh A. Alsoufi, Maheyzah Md Siraj, Fuad A. Ghaleb, Aya Hasan Abdulqader, Elham Ali, Maryam Omar:
An Anomaly Intrusion Detection Systems in IoT Based on Autoencoder: A Review. IRICT (2) 2023: 224-239 - Yaser Ahmad Arabyat, Abdulsalam Alarabeyyat, Murad Abuaddous:
Overview of Cybersecurity Trends in Jordan's Financial Sector. IRICT (2) 2023: 285-292 - Mahmood A. Bazel, Fathey Mohammed, Abdullah O. Baarimah, Gamal Alawi, Al-Baraa Abdulrahman Al-Mekhlafi, Basheer Almuhaya:
The Era of Industry 5.0: An Overview of Technologies, Applications, and Challenges. IRICT (2) 2023: 274-284 - Islam Djemmal, Hacene Belhadef:
Comparative Analysis of Topic Modeling Algorithms Based on Arabic News Documents. IRICT (2) 2023: 112-121 - Lee Choo Hui, Pantea Keikhosrokiani, Moussa Pourya Asl, Minna Isomursu, Henry Oinas-Kukkonen:
Sentiment Analysis and Innovative Recommender System: Enhancing Goodreads Book Discovery Using Hybrid Collaborative and Content Based Filtering. IRICT (2) 2023: 97-111 - Ayesha Hussain, Pantea Keikhosrokiani, Moussa Pourya Asl:
Employee Mental Workload Classification in Industrial Workplaces: A Machine Learning Approach. IRICT (2) 2023: 39-50 - Safa Ali Abdo Hussein, R. Badlishah Ahmad, Naimah Yaakob, Fathey Mohammed:
Matrix Profile Unleashed: A Solution to IoT Data Redundancy Challenges. IRICT (2) 2023: 73-84 - Haneen Siraj Ibrahim, Narjis Mezaal Shati, Sinan Q. Salih:
Utilizing Deep Learning Technique for Arabic Image Captioning. IRICT (2) 2023: 191-201 - Ashraf Osman Ibrahim, Chiew Cheng Yi, Abubakar Elsafi, Fuad A. Ghaleb:
Revolutionizing Airline Customer Satisfaction Analysis with Machine Learning Techniques. IRICT (2) 2023: 141-152 - Babangida Isyaku, Kamalrulnizam Abu Bakar, Saidu Abdulrahman, Muhammed Nura Yusuf, Farkhana Binti Muchtar, Fuad A. Ghaleb:
Mobile Device Influence on SDN Controller Performance in IoT-Managed Software-Defined Wireless Networks. IRICT (2) 2023: 62-72 - Ahrane Mahaganapathy, Dhanushka Jayasinghe, R. M. Kapila Tharanga Rathnayaka, Wiraj Udara Wickramaarachchi:
An Ensemble Machine Learning Approach for Predicting Flood Based on Meteorological and Topographical Features: A Comparative Study in Kalu Ganga River Basin, Sri Lanka. IRICT (2) 2023: 165-175 - Roqia Sailh Mahmood, Ismail Taha Ahmed:
Performance Analysis of Textured Contact Lens IRIS Detection Based on Manual Feature Engineering. IRICT (2) 2023: 202-213 - Noof T. Mahmood, Mohanad S. Jabbar, Mariam Abdalrazak:
A Real-Time Hand Gesture Recognition Based on Media-Pipe and Support Vector Machine. IRICT (2) 2023: 263-273 - Tariq Saeed Mian, Abdullah Alsaeedi:
Software Bug Severity Prediction Using Convolutional Neural Network and BiLSTM Models. IRICT (2) 2023: 1-12 - Ayman Moustafa, AbdulRahman A. Al-Sewari, Sara Hassan:
Plants Monitoring API to Detect Tomato Leaf Diseases Using Deep-Learning Algorithms. IRICT (2) 2023: 85-96 - Okfalisa, Giska Dwi Kasmadani, Pizaini, Iwan Iskandar, Rizka Hafsari, Saktioto:
Facial Wash Products Recommendation System: Profile User-Based Using Fuzzy Analytical Hierarchy Process Approach. IRICT (2) 2023: 13-25 - Josephine Oludipe, Faisal Saeed, Rasheed Mohammed:
Machine Learning Techniques for Evaluating Student Performance. IRICT (2) 2023: 306-317 - Tolulope Olushola Olufemi, Oluwatolani Achimugu, Suleiman Abu Usman, Enem Theophilus Aniemeka, Philip Achimugu, Chinonyelum Vivian Nwufoh, Ridwan Kolapo:
Comparative Analysis to Develop a Dimensionality Reduction Model for Classifying Intrusion Detection Systems. IRICT (2) 2023: 133-140 - Nour El Houda Ouamane, Hacene Belhadef:
Proposed Model for QCNN-Based Sentimental Short Sentences Classification. IRICT (2) 2023: 214-223 - Oluwabukunmi Oyegbile, Faisal Saeed, Samer Bamansoor:
Hybrid Filter Feature Selection for Improving Cancer Classification in High-Dimensional Microarray Data. IRICT (2) 2023: 293-305 - Akhas Rahmadeyan, Mustakim, Moh Erkamim, Imam Ahmad, Sepriano, Syarfi Aziz:
Air Pollution Prediction Using Long Short-Term Memory Variants. IRICT (2) 2023: 122-132 - Nor 'Afifah Sabri, Shakiroh Khamis, Zanariah Zainudin:
Android Malware Detection Using Machine Learning Technique. IRICT (2) 2023: 153-164 - Sajid Shah, Syed Hamid Hussain Madni, Siti Zaitoon Bt. Mohd Hashim, Javed Ali, Muhammad Faheem, Nor Azizah Ali:
Assessing the Prioritization of Key Influencing Factors for Industrial IoT Readiness in SMEs. IRICT (2) 2023: 252-262 - Aishwarya Sharma, Essa Q. Shahra, Shadi Basurra:
Comparative Analysis of ResNet50, and VGG16 Architectures for Counterfeit Logo Identification. IRICT (2) 2023: 240-251 - Yit Khee Wong, Sharin Hazlin Huspi:
A Conceptual Framework for Malay-English Code-Switched Neural Machine Translation. IRICT (2) 2023: 51-61
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-07 21:33 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint