Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavioral appraoch for intrusion detection., , , and . AICCSA, page 1-5. IEEE Computer Society, (2015)Smart Model for Classification and Orientation of Learners in a MOOC., , and . Int. J. Emerg. Technol. Learn., 17 (5): 19-35 (March 2022)Real-Time Self-Adaptive Traffic Management System for Optimal Vehicular Navigation in Modern Cities., , and . Comput., 12 (4): 80 (April 2023)Case Study on the Evolution of Learners' Learning in the MOOC., , and . Int. J. Emerg. Technol. Learn., 17 (13): 235-251 (July 2022)Towards a New Approach for Modelling Interactive Real Time Systems Based on Collaborative Decisions Network., , and . Netw. Protoc. Algorithms, 7 (1): 42-63 (2015)Modelling of context Information for disaster emergency system application: Flood., , and . CIST, page 906-911. IEEE, (2016)Towards a new approach to reduce the dropout rate in e-learning., , and . NISS, page 27:1-27:4. ACM, (2020)Security and Surveillance System for Drivers Based on User Profile and learning systems for Face Recognition., , , and . Netw. Protoc. Algorithms, 7 (1): 98-118 (2015)The Personalization of Learners' Educational Paths E-learning., , and . NISS (Springer), volume 237 of Smart Innovation, Systems and Technologies, page 521-534. Springer, (2021)Query optimization based on users profile., , , and . ICMCS, page 706-712. IEEE, (2012)