default search action
Abdulwahab Ali Almazroi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Faisal Alsubaei, Abdulwahab Ali Almazroi, Nasir Ayub:
Enhancing Phishing Detection: A Novel Hybrid Deep Learning Framework for Cybercrime Forensics. IEEE Access 12: 8373-8389 (2024) - [j30]Abdulwahab Ali Almazroi, Monagi H. Alkinani, Mahmood A. Al-Shareeda, Mohammed A. Alqarni, Alaa Atallah Almazroey, Tarek Gaber:
FC-LSR: Fog Computing-Based Lightweight Sybil Resistant Scheme in 5G-Enabled Vehicular Networks. IEEE Access 12: 30101-30112 (2024) - [j29]Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Eesa Alsolami, Nasir Ayub, Miltiadis D. Lytras:
Enhanced IoT Security for DDOS Attack Detection: Split Attention-Based ResNeXt-GRU Ensembler Approach. IEEE Access 12: 112368-112380 (2024) - [j28]Amira M. Idrees, Abdulwahab Ali Almazroi, Ayman E. Khedr:
Utilizing Mining Techniques for Attributes' Intra-Relationship Detection, a Collaborative Approach. Int. J. Hum. Comput. Interact. 40(2): 190-202 (2024) - [j27]Abdulwahab Ali Almazroi, Mohammed A. Alqarni, Mahmood A. Al-Shareeda, Monagi H. Alkinani, Alaa Atallah Almazroey, Tarek Gaber:
FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network. Internet Things 25: 101096 (2024) - [j26]Raja Nadir Mahmood Khan, Abdul Majid, Seong-O Shim, Safa Habibullah, Abdulwahab Ali Almazroi, Lal Hussain:
Intelligent Bayesian Inference for Multiclass Lung Infection Diagnosis: Network Analysis of Ranked Gray Level Co-occurrence (GLCM) Features. New Gener. Comput. 42(5): 997-1048 (2024) - [j25]Mohamed Meselhy Eltoukhy, Tarek Gaber, Abdulwahab Ali Almazroi, Marwa F. Mohamed:
ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques. PeerJ Comput. Sci. 10: e2001 (2024) - [j24]Walid Atwa, Abdulwahab Ali Almazroi, Nasir Ayub:
Reliable renewable energy forecasting for climate change mitigation. PeerJ Comput. Sci. 10: e2067 (2024) - [j23]Rasheed Mohammad, Faisal Saeed, Abdulwahab Ali Almazroi, Faisal Alsubaei, Abdulaleem Ali Almazroi:
Enhancing Intrusion Detection Systems Using a Deep Learning and Data Augmentation Approach. Syst. 12(3): 79 (2024) - 2023
- [j22]Abdulwahab Ali Almazroi, Nasir Ayub:
Multi-Task Learning for Electricity Price Forecasting and Resource Management in Cloud Based Industrial IoT Systems. IEEE Access 11: 54280-54295 (2023) - [j21]Abdulwahab Ali Almazroi, Eman Aldhahri, Saba Bashir, Sufyan Ashfaq:
A Clinical Decision Support System for Heart Disease Prediction Using Deep Learning. IEEE Access 11: 61646-61659 (2023) - [j20]Abdulwahab Ali Almazroi, Nasir Ayub:
Online Payment Fraud Detection Model Using Machine Learning Techniques. IEEE Access 11: 137188-137203 (2023) - [j19]Muhammad Bilal, Abdulwahab Ali Almazroi:
Effectiveness of Fine-tuned BERT Model in Classification of Helpful and Unhelpful Online Customer Reviews. Electron. Commer. Res. 23(4): 2737-2757 (2023) - [j18]Adnan Tahir, Fei Chen, Abdulwahab Ali Almazroi, Nourah Fahad Janbi:
SWEP-RF: Accuracy sliding window-based ensemble pruning method for latent sector error prediction in cloud storage computing. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101672 (2023) - [j17]Aitizaz Ali, Bander Ali Saleh Al-rimy, Faisal Alsubaei, Abdulwahab Ali Almazroi, Abdulaleem Ali Almazroi:
HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications. Sensors 23(15): 6762 (2023) - [j16]Aitizaz Ali, Bander Ali Saleh Al-rimy, Abdulwahab Ali Almazroi, Faisal Alsubaei, Abdulaleem Ali Almazroi, Faisal Saeed:
Securing Secrets in Cyber-Physical Systems: A Cutting-Edge Privacy Approach with Consortium Blockchain. Sensors 23(16): 7162 (2023) - [j15]Abdulwahab Ali Almazroi, Nasir Ayub:
Enhancing Smart IoT Malware Detection: A GhostNet-based Hybrid Approach. Syst. 11(11): 547 (2023) - [j14]Monagi H. Alkinani, Abdulwahab Ali Almazroi, Mainak Adhikari, Varun G. Menon:
Artificial Intelligence-Empowered Logistic Traffic Management System Using Empirical Intelligent XGBoost Technique in Vehicular Edge Networks. IEEE Trans. Intell. Transp. Syst. 24(4): 4499-4508 (2023) - 2022
- [j13]Abdulwahab Ali Almazroi, Walid Atwa:
An Improved Clustering Algorithm for Multi-Density Data. Axioms 11(8): 411 (2022) - [j12]Asaju La'aro Bolaji, Akeem Femi Bamigbola, Lawrence Bunmi Adewole, Peter Bamidele Shola, Adenrele Afolorunso, Adesoji Abraham Obayomi, Dayo Reuben Aremu, Abdulwahab Ali Almazroi:
A room-oriented artificial bee colony algorithm for optimizing the patient admission scheduling problem. Comput. Biol. Medicine 148: 105850 (2022) - [j11]Abdulwahab Ali Almazroi, Fathey Mohammed, Nabil Hasan Al-Kumaim, Md. Rakibul Hoque:
An empirical study of factors influencing e-health services adoption among public in Saudi Arabia. Health Informatics J. 28(2): 146045822211023 (2022) - [j10]Syed Fakhar Bilal, Abdulwahab Ali Almazroi, Saba Bashir, Farhan Hassan Khan, Abdulaleem Ali Almazroi:
An ensemble based approach using a combination of clustering and classification algorithms to enhance customer churn prediction in telecom industry. PeerJ Comput. Sci. 8: e854 (2022) - [j9]Rana Muhammad Abdul Haseeb-ur-rehman, Misbah Liaqat, Azana Hafizah Mohd Aman, Abdulwahab Ali Almazroi, Mohammad Kamrul Hasan, Zeeshan Ali, Rana Liaqat Ali:
LR-AKAP: A Lightweight and Robust Security Protocol for Smart Home Environments. Sensors 22(18): 6902 (2022) - 2021
- [j8]Saba Bashir, Abdulwahab Ali Almazroi, Sufyan Ashfaq, Abdulaleem Ali Almazroi, Farhan Hassan Khan:
A Knowledge-Based Clinical Decision Support System Utilizing an Intelligent Ensemble Voting Scheme for Improved Cardiovascular Disease Prediction. IEEE Access 9: 130805-130822 (2021) - [j7]Abdulwahab Ali Almazroi, Nasir Ayub:
A Novel Method CNN-LSTM Ensembler Based on Black Widow and Blue Monkey Optimizer for Electricity Theft Detection. IEEE Access 9: 141154-141166 (2021) - [j6]Abdulwahab Ali Almazroi, Ayman E. Khedr, Amira M. Idrees:
A proposed customer relationship framework based on information retrieval for effective Firms' competitiveness. Expert Syst. Appl. 176: 114882 (2021) - [j5]Nabil Hasan Al-Kumaim, Siti Hasnah Hassan, Muhammad Salman Shabbir, Abdulwahab Ali Almazroi, Hussein Mohammed Esmail Abu Al-Rejal:
Exploring the Inescapable Suffering Among Postgraduate Researchers: Information Overload Perceptions and Implications for Future Research. Int. J. Inf. Commun. Technol. Educ. 17(1): 19-41 (2021) - [j4]Ahmad Ziadeh, Laith Mohammad Abualigah, Mohamed Abd El Aziz, Canan Batur Sahin, Abdulwahab Ali Almazroi, Mahmoud Omari:
Augmented grasshopper optimization algorithm by differential evolution: a power scheduling application in smart homes. Multim. Tools Appl. 80(21): 31569-31597 (2021) - [j3]Iftikhar Ahmad, Muhammad Ovais Ahmad, Mohammed A. Alqarni, Abdulwahab Ali Almazroi, Muhammad Imran Khan Khalil:
Using algorithmic trading to analyze short term profitability of Bitcoin. PeerJ Comput. Sci. 7: e337 (2021) - [j2]Monagi H. Alkinani, Abdulwahab Ali Almazroi, N. Z. Jhanjhi, Navid Ali Khan:
5G and IoT Based Reporting and Accident Detection (RAD) System to Deliver First Aid Box Using Unmanned Aerial Vehicle. Sensors 21(20): 6905 (2021)
2010 – 2019
- 2019
- [j1]Muhammad Imran Khan Khalil, Iftikhar Ahmad, Abdulwahab Ali Almazroi:
Energy Efficient Indivisible Workload Distribution in Geographically Distributed Data Centers. IEEE Access 7: 82672-82680 (2019) - [c2]Abdulwahab Ali Almazroi, Haifeng Shen, Fathey Mohammed, Nabil Hasan Al-Kumaim:
Cloud Computing Services Adoption by University Students: Pilot Study Results. IRICT 2019: 1052-1060 - 2016
- [c1]Abdulwahab Ali Almazroi, Haifeng Shen, Kung-Keat Teoh, Muhammad Ali Babar:
Cloud for e-Learning: Determinants of Its Adoption by University Students in a Developing Country. ICEBE 2016: 71-78
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint