关注
Sara Abdelwahab Abdelghani Ghorashi
Sara Abdelwahab Abdelghani Ghorashi
Assistant Professor_ Princess Nourah Bint Abdulrahman University
在 pnu.edu.sa 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Blockchain for IoT applications: taxonomy, platforms, recent advances, challenges and future research directions
A Abdelmaboud, AIA Ahmed, M Abaker, TAE Eisa, H Albasheer, ...
Electronics 11 (4), 630, 2022
1332022
Quality of service (QoS) performance analysis in a traffic engineering model for next-generation wireless sensor networks
T Mazhar, MA Malik, SAH Mohsan, Y Li, I Haq, S Ghorashi, FK Karim, ...
Symmetry 15 (2), 513, 2023
152023
Integrated approach using deep neural network and CBR for detecting severity of coronary artery disease
V Sapra, L Sapra, A Bhardwaj, S Bharany, A Saxena, FK Karim, ...
Alexandria Engineering Journal 68, 709-720, 2023
142023
Enhanced cloud storage encryption standard for security in distributed environments
S Kautish, S Juneja, K Mohiuddin, FK Karim, H Elmannai, S Ghorashi, ...
Electronics 12 (3), 714, 2023
112023
Leveraging regression analysis to predict overlapping symptoms of cardiovascular diseases
S Ghorashi, K Rehman, A Riaz, HK Alkahtani, AH Samak, ...
IEEE Access, 2023
82023
Efficient Trajectory Clustering with Road Network Constraints Based on Spatiotemporal Buffering
SA Hussain, MU Hassan, W Nasar, S Ghorashi, MM Jamjoom, ...
ISPRS International Journal of Geo-Information 12 (3), 117, 2023
62023
Ensemble of flexible neural trees for predicting risk in grid computing environment
S Abdelwahab, VK Ojha, A Abraham
Innovations in Bio-Inspired Computing and Applications: Proceedings of the …, 2016
32016
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
G Alkawsi, R Al-amri, Y Baashar, S Ghorashi, E Alabdulkreem, SK Tiong
Alexandria Engineering Journal 70, 503-513, 2023
22023
Heuristic Bent Key Exchange Secured Energy Efficient Data Transaction for Traffic Offloading in Mobile Cloud
NR Sivakumar, S Ghorashi, M Jamjoom, M Alduailij
CMC-Comput. Mater. Contin 65, 1925-1943, 2020
22020
Risk Assessment for Grid Computing Using Meta-Learning Ensembles
S Abdelwahab, A Abraham
Pattern Analysis, Intelligent Security and the Internet of Things, 251-260, 2015
22015
Data mining approach for modeling risk assessment in computational grid
S Abdelwahab, A Abraham
Computational Intelligence in Data Mining-Volume 3: Proceedings of the …, 2015
22015
A Review of the Risk Factors in Computational Grid.
S Abdelwahab, A Abraham
Folklore Forum, 2013
22013
High-performance association rule mining: Mortality prediction model for cardiovascular patients with COVID-19 patterns
RG Nadakinamani, A Reyana, Y Gupta, S Kautish, S Ghorashi, ...
Alexandria Engineering Journal 71, 347-354, 2023
12023
MIoT Based Skin Cancer Detection Using Bregman Recurrent Deep Learning.
NR Sivakumar, SA Ghorashi, FK Karim, E Alabdulkreem, A Al-Rasheed
Computers, Materials & Continua 73 (3), 2022
12022
Blockchain with optimal deep learning assisted secure data sharing and classification on future healthcare systems
AA Alanazi, FK Karim, SA Ghorashi, G Amoudi, SHA Hamza
Alexandria Engineering Journal 99, 168-179, 2024
2024
Enhancement of the IEEE 802.11 Medium Access Control Protocol with the Channel Usage Based Backoff Algorithm for Wireless Ad Hoc Networks
N Mast, S Khan, FK Karim, MI Uddin, S Alshetewi, S Ghorashi, MA Khan, ...
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES 14, 2024
2024
Smart Healthcare Activity Recognition Using Statistical Regression and Intelligent Learning.
K Akilandeswari, NR Sivakumar, HK Alkahtani, S Basheer, SA Ghorashi
Computers, Materials & Continua 78 (1), 2024
2024
Fischer machine learning for mobile cloud computing in eHealth systems using blockchain mechanism
NR Sivakumar, SA Ghorashi, N Ahmed, HEA Elsrej, S Basheer
Microprocessors and Microsystems 103, 104969, 2023
2023
Modeling Risk Assessment in Computational Grid Using Machine Learning Techniques
SAA Ghorashi
Sudan University of Science and Technology, 2016
2016
Modelling Risk Assessment in a Computational Grid using the Data Mining Approach.
S Abdelwahab, A Abraham
Journal of Information Assurance & Security 10 (6), 2015
2015
系统目前无法执行此操作,请稍后再试。
文章 1–20