Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Hossam FarisProfessor, The University of JordanVerified email at ju.edu.jo
Ibrahim AljarahProfessor of Big Data Mining and Computational Intelligence, The University of JordanVerified email at ju.edu.jo
Mohammad HassonahUniversity of JordanVerified email at fgs.ju.edu.jo
Majdi MafarjaAssociate Professor of Computer Science, Birzeit UniversityVerified email at birzeit.edu
Ali Asghar HeidariPhD. Exceptionally Talented Researcher, School of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Seyedali MirjaliliProfessor, Torrens University Australia, Adjunct Griffith UniversityVerified email at griffith.edu.au
Ja'far Alqatawna, Associate ProfessorUniversity of Jordan and Higher Colleges of TechnologyVerified email at hct.ac.ae
Raneem QaddouraAssistant Professor of Artificial Intelligence and Data Science, Al Hussein Technical UniversityVerified email at htu.edu.jo
Maria HabibUniversity of JordanVerified email at fgs.ju.edu.jo
Pedro A. CastilloUniversidad de GranadaVerified email at atc.ugr.es
Rizik M. H. Al-SayyedFull Professor at the University of JordanVerified email at ju.edu.jo
Mohammed EshtayASAC, Luminus Technical University CollegeVerified email at fgs.ju.edu.jo
Antonio MoraAssociate Professor at Dept. of Signal Theory, Telematics and Communications. University of GranadaVerified email at ugr.es
Alaa ShetaComputer Science Department, Southern Connecticut State UniversityVerified email at southernct.edu
Dr. Dana Al QudahAssociate Professor of Information Technology, University of JordanVerified email at ju.edu.jo
Ali Safaa SadiqAssociate Professor in Cyber Security, Department of Computer Science, Nottingham Trent UniversityVerified email at ntu.ac.uk