Search

Your search keyword '"Haqiq, Abdelkrim"' showing total 92 results

Search Constraints

Start Over You searched for: Author "Haqiq, Abdelkrim" Remove constraint Author: "Haqiq, Abdelkrim" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
92 results on '"Haqiq, Abdelkrim"'

Search Results

8. Smart Farming System Based on Intelligent Internet of Things and Predictive Analytics.

9. Accurate Analytical Model and Evaluation of Wi-Fi Halow Based IoT Networks under a Rayleigh-Fading Channel with Capture.

10. Enhancing the Effectiveness of COVID-19 Bluetooth-Based Contact Tracing Apps: A Modeling Study.

11. Blind Handover Detection based on KLD: Channel Capacity and Outage Probability Estimations for Rice and Nakagami Models.

12. Dynamic resource allocation for service in mobile cloud computing with Markov modulated arrivals.

13. Feature matching for 3D AR: Review from handcrafted methods to deep learning.

14. Three-dimensional Markov Chain Model to Help Reduce the Spread of COVID-19 in IoT Environment.

15. Enhanced Pricing Strategy for Slotted ALOHA with ZigZag Decoding: A Stochastic Game Approach.

16. Enhanced Solid-Flow: An Enhanced Flow Rules Security Mechanism for SDN.

17. Predicting the Route of the Longest Lifetime and the Data Packet Delivery Time between Two Vehicles in VANET.

18. Solving the travelling salesman problem using fuzzy and simplified variants of ant supervised by PSO with local search policy, FAS-PSO-LS, SAS-PSO-LS.

21. Mathematical Model based on Game Theory and Markov Chains for Analysing the Transmission Cost in SA-ZD Mechanism.

22. Predicting the longest route lifetime as the most stable route between two vehicles in VANET.

23. SDN-based SYN Flooding Defense in Cloud.

24. Beyond Dynamic Programming: Performance Evaluation and Enhancement of Multi-tenant Cloud Infrastructures.

25. Modeling a Sandbox Security Mechanism in Cloud Computing Environment using Bayesian Game.

42. Cloud Computing Security Modeling and Analysis based on a Self-Cleansing Intrusion Tolerance Technique.

43. Security Assessment Framework for Multi-tenant Cloud with Nested Virtualization.

Catalog

Books, media, physical & digital resources