Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Hossam FarisProfessor, The University of JordanVerified email at ju.edu.jo
Sultan AljahdaliProfessor of Computer Science, Taif University, Saudi ArabiaVerified email at tu.edu.sa
Hamza TurabiehHealth Management and Bioinformatics department, University of MissouriVerified email at health.missouri.edu
Aladdin AyeshProfessor of Artificial Intelligence, De Montfort University, UKVerified email at dmu.ac.uk
Ala Al-AfeefResearch fellow - King's college LondonVerified email at kcl.ac.uk
Mouhammd AlkasassbehProfessor of cyber security, Princess Sumaya University for Technology, JordanVerified email at psut.edu.jo
Ismail AL-TaharwaAssociate professor, The University of Jordan, AqabaVerified email at ju.edu.jo
Walid AlyHuawei Technologies CanadaVerified email at huawei.com
Nazeeh GhatashehAssociate Professor, Dept. of Information Technology, The University of JordanVerified email at ju.edu.jo
Dr. Mehedi MasudProfessor, Department of Computer Science, Taif University, Saudi ArabiaVerified email at tu.edu.sa
Yasser Refaat Abdel-FattahBioprocess Development Dept., Genetic Engineering and Biotechnology Research Institute, SRTA CityVerified email at srtacity.sci.eg
walaa shetaProfessor of Computer and InformaticsVerified email at srtacity.sci.eg
Follow
Alaa Sheta
Computer Science Department, Southern Connecticut State University
Verified email at southernct.edu - Homepage