Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD)., , , , , and . ICITST, page 204-209. IEEE, (2016)Context Representation and Fusion: Advancements and Opportunities., , , , , , , and . Sensors, 14 (6): 9628-9668 (2014)Analysis of symbolic models of biometrie data and their use for action and user identification., , , , and . CIBCB, page 1-8. IEEE, (2018)Applying Deep Neural Networks for Predicting Dark Triad Personality Trait of Online Users., , , , , and . ICOIN, page 102-105. IEEE, (2020)Achieving Dynamic and Distributed Session Management with Chord for Software as a Service Cloud., , , and . J. Softw., 7 (6): 1403-1412 (2012)CSMC: chord based session management framework for software as a service cloud., , , and . ICUIMC, page 30. ACM, (2011)Sedentary Behavior-Based User Life-Log Monitoring for Wellness Services., , and . ICOST, volume 9677 of Lecture Notes in Computer Science, page 283-292. Springer, (2016)A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction., , , , , , and . IEEE Access, (2019)Rumor Detection in Business Reviews Using Supervised Machine Learning., , , , , and . BESC, page 233-237. IEEE, (2018)Configurable Data Acquisition for Cloud-centric IoT., , , , , and . IMCOM, page 23:1-23:5. ACM, (2018)