default search action
Tawfik Al Hadhrami
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Tareq M. Alkhaldi, Abdulbasit A. Darem, Asma Alhashmi, Tawfik Al Hadhrami, Azza Elneil Osman:
Enhancing smart city IoT communication: A two-layer NOMA-based network with caching mechanisms and optimized resource allocation. Comput. Networks 255: 110857 (2024) - [j18]Achraf Othman, Khansa Chemnad, Aboul Ella Hassanien, Ahmed Tlili, Christina Yan Zhang, Dena Al-Thani, Fahriye Altinay, Hajer Chalghoumi, Hend S. Al-Khalifa, Maisa Obeid, Mohamed Jemni, Tawfik Al Hadhrami, Zehra Altinay:
Accessible Metaverse: A Theoretical Framework for Accessibility and Inclusion in the Metaverse. Multimodal Technol. Interact. 8(3): 21 (2024) - [j17]Adeeb Sait, Tawfik Al Hadhrami, Faisal Saeed, Shadi Basurra, Sultan Noman Qasem:
Laser communications system with drones as relay medium for healthcare applications. PeerJ Comput. Sci. 10: e1759 (2024) - [j16]Haya Abu-Nowar, Adeeb Sait, Tawfik Al Hadhrami, Mohammed Al-Sarem, Sultan Noman Qasem:
SENSES-ASD: a social-emotional nurturing and skill enhancement system for autism spectrum disorder. PeerJ Comput. Sci. 10: e1792 (2024) - [j15]Sena Al-Hadhrami, Tamás Vinkó, Tawfik Al Hadhrami, Faisal Saeed, Sultan Noman Qasem:
Deep learning-based method for sentiment analysis for patients' drug reviews. PeerJ Comput. Sci. 10: e1976 (2024) - [c14]Mkrm Almuhaya, Tawfik Al Hadhrami, Omprakash Kaiwartya, David. J. Brown:
MBMD-LoRa Scalable LoRaWAN for Internet of Things: A Multi-band Multi-data Rate Approach. ICCCI (CCIS Volume 2) 2024: 54-67 - [c13]Kwame Assa-Agyei, Kayode Owa, Funminiyi Olajide, Tawfik Al Hadhrami:
A Multi-Chaotic Key Expansion for Advanced Encryption Standard (AES) Algorithm. ICNC 2024: 1-7 - 2023
- [j14]Fuad A. Ghaleb, Faisal Saeed, Mohammed Al-Sarem, Sultan Noman Qasem, Tawfik Al Hadhrami:
Ensemble Synthesized Minority Oversampling-Based Generative Adversarial Networks and Random Forest Algorithm for Credit Card Fraud Detection. IEEE Access 11: 89694-89710 (2023) - [j13]Alan C. Jamieson, Chris Few, Kenny Awuson-David, Tawfik Al Hadhrami:
HVA_CPS proposal: a process for hazardous vulnerability analysis in distributed cyber-physical systems. PeerJ Comput. Sci. 9: e1249 (2023) - [j12]Ibrahim Alameri, Jitka Komarkova, Tawfik Al Hadhrami:
Fuzzy-based optimization of AODV routing for efficient route in wireless mesh networks. PeerJ Comput. Sci. 9: e1508 (2023) - 2022
- [j11]Firas AlBalas, Ahmad AlZu'bi, Alanoud Alguzo, Tawfik Al Hadhrami, Achraf Othman:
Learning Discriminant Spatial Features With Deep Graph-Based Convolutions for Occluded Face Detection. IEEE Access 10: 35162-35171 (2022) - [j10]Zeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed, Mohammed Al-Sarem, Faisal Saeed, Tawfik Al Hadhrami, Mohammad T. Alshammari, Abdulrahman Alreshidi, Talal Sarheed Alshammari:
Phishing Websites Detection by Using Optimized Stacking Ensemble Model. Comput. Syst. Sci. Eng. 41(1): 109-125 (2022) - [j9]Ibrahim Alameri, Jitka Komarkova, Tawfik Al Hadhrami, Ahmad Lotfi:
Systematic review on modification to the ad-hoc on-demand distance vector routing discovery mechanics. PeerJ Comput. Sci. 8: e1079 (2022) - [j8]Mona Algarni, Faisal Saeed, Tawfik Al Hadhrami, Fahad Ghabban, Mohammed Al-Sarem:
Deep Learning-Based Approach for Emotion Recognition Using Electroencephalography (EEG) Signals Using Bi-Directional Long Short-Term Memory (Bi-LSTM). Sensors 22(8): 2976 (2022) - 2021
- [j7]Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Mamoun Alazab, Syed Zainudeen Mohd Shaid, Fuad A. Ghaleb, Abdulmohsen Almalawi, Abdullah Marish Ali, Tawfik Al Hadhrami:
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection. Future Gener. Comput. Syst. 115: 641-658 (2021) - [j6]Kenny Awuson-David, Tawfik Al Hadhrami, Mamoun Alazab, Nazaraf Shah, Andrii Shalaginov:
BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem. Future Gener. Comput. Syst. 122: 1-13 (2021) - [j5]Abdullah Marish Ali, Siti Mariyam Shamsuddin, Fathy E. Eassa, Faisal Saeed, Madini O. Alassafi, Tawfik Al Hadhrami, Ahmed M. Elmisery:
Towards an Intelligent Framework for Cloud Service Discovery. Int. J. Cloud Appl. Comput. 11(3): 33-57 (2021) - 2020
- [j4]Mohammed Al-Sarem, Faisal Saeed, Abdullah Alsaeedi, Wadii Boulila, Tawfik Al Hadhrami:
Ensemble Methods for Instance-Based Arabic Language Authorship Attribution. IEEE Access 8: 17331-17345 (2020) - [j3]Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Mamoun Alazab, Fawaz Alsolami, Syed Zainudeen Mohd Shaid, Fuad A. Ghaleb, Tawfik Al Hadhrami, Abdullah Marish Ali:
A Pseudo Feedback-Based Annotated TF-IDF Technique for Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation and Features Extraction. IEEE Access 8: 140586-140598 (2020) - [c12]Abdulaziz Aborujilah, Rasheed Mohammad Nassr, AbdulAleem Al-Othmani, Nor Azlina Ali, Zalizah Awang Long, Mohd Nizam Husen, Tawfik Al Hadhrami, Hideya Ochiai:
SMOTE-Based Framework for IoT Botnet Attack Detection. ACeS 2020: 287-296 - [c11]Abdulaziz Aborujilah, Rasheed Mohammad Nassr, Tawfik Al Hadhrami, Mohd Nizam Husen, Nor Azlina Ali, AbdulAleem Al-Othmani, Mustapha Hamdi:
Comparative Study of SMOTE and Bootstrapping Performance Based on Predication Methods. IRICT 2020: 3-9
2010 – 2019
- 2019
- [j2]Fuad A. Ghaleb, Mohd Aizaini Maarof, Anazida Binti Zainal, Bander Ali Saleh Al-rimy, Faisal Saeed, Tawfik Al Hadhrami:
Hybrid and Multifaceted Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network. IEEE Access 7: 159119-159140 (2019) - [c10]Michael O. Omoyibo, Tawfik Al Hadhrami, Funminiyi Olajide, Ahmad Lotfi, Ahmed M. Elmisery:
Sensor Network in Automated Hand Hygiene Systems Using IoT for Public Building. IRICT 2019: 463-476 - [c9]Ahmed Mohammed Al-Samman, Tharek Abdul Rahman, Tawfik Al Hadhrami:
5G Channel Propagation at 28 GHz in Indoor Environment. IRICT 2019: 634-642 - [c8]Abdulaziz Aborujilah, Rasheed Mohammad Nassr, Tawfik Al Hadhrami, Mohd Nizam Husen, Nor Azlina Ali, AbdulAleem Al-Othmani, Nur Syahela, Hideya Ochiai:
Security Assessment Model to Analysis DOS Attacks in WSN. IRICT 2019: 789-800 - [c7]Kenny Awuson-David, Tawfik Al Hadhrami, Funminiyi Olajide, Ahmad Lotfi:
Using Hyperledger Fabric Blockchain to Maintain the Integrity of Digital Evidence in a Containerised Cloud Ecosystem. IRICT 2019: 839-848 - [c6]Olatorera Williams, Funminiyi Olajide, Tawfik Al Hadhrami, Ahmad Lotfi:
Exploring Process of Information Systems and Information Technology for Enterprise Agility. IRICT 2019: 1042-1051 - 2018
- [j1]Majid Abdullateef Abdullah, Tawfik Al Hadhrami, Chee-Wei Tan, Abdul Halim Yatim:
Towards Green Energy for Smart Cities: Particle Swarm Optimization Based MPPT Approach. IEEE Access 6: 58427-58438 (2018) - 2015
- [c5]Tawfik Al Hadhrami, James Nightingale, Qi Wang, Christos Grecos, Nasser Kehtarnavaz:
A simulator tool set for evaluating HEVC/SHVC streaming. Real-Time Image and Video Processing 2015: 94000N - 2014
- [b1]Tawfik Al Hadhrami:
Wireless mesh networking architectures and protocols for emergency services. University of the West of Scotland, Hamilton, UK, 2014 - [c4]Tawfik Al Hadhrami, James Nightingale, Qi Wang, Christos Grecos:
Network-aware scalable video monitoring system for emergency situations with operator-managed fidelity control. Real-Time Image and Video Processing 2014: 91390M - 2013
- [c3]Tawfik Al Hadhrami, Qi Wang, Christos Grecos:
Power- and Node-Type-Aware Routing Algorithm for Emergency-Response Wireless Mesh Networks. VTC Spring 2013: 1-5 - 2012
- [c2]Tawfik Al Hadhrami, Qi Wang, Christos Grecos:
Real-time visual communication to aid disaster recovery in a multi-segment hybrid wireless networking system. Real-Time Image and Video Processing 2012: 84370R - 2011
- [c1]Tawfik Al Hadhrami, Qi Wang, Malcolm K. Crowe, Christos Grecos:
UrgentMesh: Wireless mesh networks with DVB-Satellite for emergency management. ICUMT 2011: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint