Author of the publication

STUDENTS E-READINESS IN INSTITUTIONS OF THE ROYAL COMMISSION IN JUBAIL

, and . International Journal of Advanced Information Technology (IJAIT), 8 (4/5): 15-25 (October 2018)
DOI: 10.5121/ijait.2018.8502

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks., , , , and . IEEE Access, (2023)STUDENTS E-READINESS IN INSTITUTIONS OF THE ROYAL COMMISSION IN JUBAIL, and . International Journal of Advanced Information Technology (IJAIT), 8 (4/5): 15-25 (October 2018)Conti Ransomware Development Evaluation., , and . ACM Southeast Regional Conference, page 39-46. ACM, (2023)Towards Improving Phishing Detection System Using Human in the Loop Deep Learning Model., , and . ACM Southeast Regional Conference, page 77-85. ACM, (2024)FallFree: Multiple Fall Scenario Dataset of Cane Users for Monitoring Applications Using Kinect., , , and . SITIS, page 327-333. IEEE Computer Society, (2017)Watchful-Eye: A 3D Skeleton-Based System for Fall Detection of Physically-Disabled Cane Users., , , and . MobiHealth, volume 247 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 107-116. Springer, (2017)Deep Models for Multi-View 3D Object Recognition: A Review., , , , and . CoRR, (2024)