Get my own profile
Public access
View all5 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Hossam FarisProfessor, The University of JordanVerified email at ju.edu.jo
Ibrahim AljarahProfessor of Big Data Mining and Computational Intelligence, The University of JordanVerified email at ju.edu.jo
Mohammad HassonahUniversity of JordanVerified email at fgs.ju.edu.jo
Majdi MafarjaAssociate Professor of Computer Science, Birzeit UniversityVerified email at birzeit.edu
Seyedali MirjaliliProfessor, Torrens University Australia, Obuda University, Griffith UniversityVerified email at griffith.edu.au
Ja'far Alqatawna, Associate ProfessorUniversity of Jordan and Higher Colleges of TechnologyVerified email at ju.edu.jo
Raneem QaddouraAssistant Professor of Artificial Intelligence and Data Science, Al Hussein Technical UniversityVerified email at htu.edu.jo
Pedro A. Castillo-ValdiviesoUniversidad de GranadaVerified email at ugr.es
Rizik M. H. Al-SayyedFull Professor at the University of JordanVerified email at ju.edu.jo
Antonio MoraAssociate Professor at Dept. of Signal Theory, Telematics and Communications. University of GranadaVerified email at ugr.es
Mohammed EshtayASAC, Luminus Technical University CollegeVerified email at fgs.ju.edu.jo
Dr. Dana Al QudahAssociate Professor of Information Technology, University of JordanVerified email at ju.edu.jo
Alaa ShetaComputer Science Department, Southern Connecticut State UniversityVerified email at southernct.edu
Ali Safaa SadiqAssociate Professor in Cyber Security, Department of Computer Science, Nottingham Trent UniversityVerified email at ntu.ac.uk
Ali Asghar HeidariPhD. Exceptionally Talented Researcher, School of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Maria HabibGranada University