Blockchain for IoT applications: taxonomy, platforms, recent advances, challenges and future research directions A Abdelmaboud, AIA Ahmed, M Abaker, TAE Eisa, H Albasheer, ... Electronics 11 (4), 630, 2022 | 133 | 2022 |
Quality of service (QoS) performance analysis in a traffic engineering model for next-generation wireless sensor networks T Mazhar, MA Malik, SAH Mohsan, Y Li, I Haq, S Ghorashi, FK Karim, ... Symmetry 15 (2), 513, 2023 | 15 | 2023 |
Integrated approach using deep neural network and CBR for detecting severity of coronary artery disease V Sapra, L Sapra, A Bhardwaj, S Bharany, A Saxena, FK Karim, ... Alexandria Engineering Journal 68, 709-720, 2023 | 14 | 2023 |
Enhanced cloud storage encryption standard for security in distributed environments S Kautish, S Juneja, K Mohiuddin, FK Karim, H Elmannai, S Ghorashi, ... Electronics 12 (3), 714, 2023 | 11 | 2023 |
Leveraging regression analysis to predict overlapping symptoms of cardiovascular diseases S Ghorashi, K Rehman, A Riaz, HK Alkahtani, AH Samak, ... IEEE Access, 2023 | 8 | 2023 |
Efficient Trajectory Clustering with Road Network Constraints Based on Spatiotemporal Buffering SA Hussain, MU Hassan, W Nasar, S Ghorashi, MM Jamjoom, ... ISPRS International Journal of Geo-Information 12 (3), 117, 2023 | 6 | 2023 |
Ensemble of flexible neural trees for predicting risk in grid computing environment S Abdelwahab, VK Ojha, A Abraham Innovations in Bio-Inspired Computing and Applications: Proceedings of the …, 2016 | 3 | 2016 |
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction G Alkawsi, R Al-amri, Y Baashar, S Ghorashi, E Alabdulkreem, SK Tiong Alexandria Engineering Journal 70, 503-513, 2023 | 2 | 2023 |
Heuristic Bent Key Exchange Secured Energy Efficient Data Transaction for Traffic Offloading in Mobile Cloud NR Sivakumar, S Ghorashi, M Jamjoom, M Alduailij CMC-Comput. Mater. Contin 65, 1925-1943, 2020 | 2 | 2020 |
Risk Assessment for Grid Computing Using Meta-Learning Ensembles S Abdelwahab, A Abraham Pattern Analysis, Intelligent Security and the Internet of Things, 251-260, 2015 | 2 | 2015 |
Data mining approach for modeling risk assessment in computational grid S Abdelwahab, A Abraham Computational Intelligence in Data Mining-Volume 3: Proceedings of the …, 2015 | 2 | 2015 |
A Review of the Risk Factors in Computational Grid. S Abdelwahab, A Abraham Folklore Forum, 2013 | 2 | 2013 |
High-performance association rule mining: Mortality prediction model for cardiovascular patients with COVID-19 patterns RG Nadakinamani, A Reyana, Y Gupta, S Kautish, S Ghorashi, ... Alexandria Engineering Journal 71, 347-354, 2023 | 1 | 2023 |
MIoT Based Skin Cancer Detection Using Bregman Recurrent Deep Learning. NR Sivakumar, SA Ghorashi, FK Karim, E Alabdulkreem, A Al-Rasheed Computers, Materials & Continua 73 (3), 2022 | 1 | 2022 |
Blockchain with optimal deep learning assisted secure data sharing and classification on future healthcare systems AA Alanazi, FK Karim, SA Ghorashi, G Amoudi, SHA Hamza Alexandria Engineering Journal 99, 168-179, 2024 | | 2024 |
Enhancement of the IEEE 802.11 Medium Access Control Protocol with the Channel Usage Based Backoff Algorithm for Wireless Ad Hoc Networks N Mast, S Khan, FK Karim, MI Uddin, S Alshetewi, S Ghorashi, MA Khan, ... HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES 14, 2024 | | 2024 |
Smart Healthcare Activity Recognition Using Statistical Regression and Intelligent Learning. K Akilandeswari, NR Sivakumar, HK Alkahtani, S Basheer, SA Ghorashi Computers, Materials & Continua 78 (1), 2024 | | 2024 |
Fischer machine learning for mobile cloud computing in eHealth systems using blockchain mechanism NR Sivakumar, SA Ghorashi, N Ahmed, HEA Elsrej, S Basheer Microprocessors and Microsystems 103, 104969, 2023 | | 2023 |
Modeling Risk Assessment in Computational Grid Using Machine Learning Techniques SAA Ghorashi Sudan University of Science and Technology, 2016 | | 2016 |
Modelling Risk Assessment in a Computational Grid using the Data Mining Approach. S Abdelwahab, A Abraham Journal of Information Assurance & Security 10 (6), 2015 | | 2015 |