Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Hossam FarisProfessor, The University of JordanEmail verificata su ju.edu.jo
- Ibrahim AljarahProfessor of Big Data Mining and Computational Intelligence, The University of JordanEmail verificata su ju.edu.jo
- Mohammad HassonahUniversity of JordanEmail verificata su fgs.ju.edu.jo
- Majdi MafarjaAssociate Professor of Computer Science, Birzeit UniversityEmail verificata su birzeit.edu
- Seyedali MirjaliliProfessor, Torrens University Australia, Obuda University, Griffith UniversityEmail verificata su griffith.edu.au
- Ja'far Alqatawna, Associate ProfessorUniversity of Jordan and Higher Colleges of TechnologyEmail verificata su ju.edu.jo
- Raneem QaddouraAssistant Professor of Artificial Intelligence and Data Science, Al Hussein Technical UniversityEmail verificata su htu.edu.jo
- Pedro A. Castillo-ValdiviesoUniversidad de GranadaEmail verificata su ugr.es
- Rizik M. H. Al-SayyedFull Professor at the University of JordanEmail verificata su ju.edu.jo
- Antonio MoraAssociate Professor at Dept. of Signal Theory, Telematics and Communications. University of GranadaEmail verificata su ugr.es
- Mohammed EshtayASAC, Luminus Technical University CollegeEmail verificata su fgs.ju.edu.jo
- Dr. Dana Al QudahAssociate Professor of Information Technology, University of JordanEmail verificata su ju.edu.jo
- Alaa ShetaComputer Science Department, Southern Connecticut State UniversityEmail verificata su southernct.edu
- Ali Safaa SadiqAssociate Professor in Cyber Security, Department of Computer Science, Nottingham Trent UniversityEmail verificata su ntu.ac.uk
- Ali Asghar HeidariPhD. Exceptionally Talented Researcher, School of Computing, National University of SingaporeEmail verificata su comp.nus.edu.sg
- Maria HabibGranada University