Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid bee colony optimization for examination timetabling problems., and . Comput. Oper. Res., (2015)Hybrid topic modeling method based on dirichlet multinomial mixture and fuzzy match algorithm for short text clustering., , , , , , , , and . J. Big Data, 11 (1): 68 (December 2024)An improved rule induction based denial of service attacks classification model., , , and . Comput. Secur., (2020)Cyberbullying detection framework for short and imbalanced Arabic datasets., , , , , , , , , and 1 other author(s). J. King Saud Univ. Comput. Inf. Sci., 35 (8): 101652 (September 2023)Hybrid Artificial Bee Colony Search Algorithm Based on Disruptive Selection for Examination Timetabling Problems., and . COCOA, volume 6831 of Lecture Notes in Computer Science, page 31-45. Springer, (2011)A hybrid self-adaptive bees algorithm for examination timetabling problems., and . Appl. Soft Comput., 13 (8): 3608-3620 (2013)Moth optimisation algorithm with local search for the permutation flow shop scheduling problem., , , , and . Int. J. Comput. Appl. Technol., 65 (3): 189-208 (2021)Improved Multi-Verse Optimizer Feature Selection Technique With Application To Phishing, Spam, and Denial Of Service Attacks., , , , and . Int. J. Commun. Networks Inf. Secur., (2021)Intrusion Detection Using an Improved Cuckoo Search Optimization Algorithm., , , , , , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 15 (2): 73-93 (2024)The impact of the digital storytelling rubrics on the social media engagements., , , and . Int. J. Comput. Appl. Technol., 59 (3): 269-275 (2019)