default search action
Mohammad A. Alghamdi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Kazim Ali, Muhammad Shahid Bhatti, Atif Saeed, Atifa Athar, Mohammed A. Al Ghamdi, Sultan H. Almotiri, Samina Akram:
Adversarial Robustness of Vision Transformers Versus Convolutional Neural Networks. IEEE Access 12: 105281-105293 (2024) - [j33]Esraa Samkari, Muhammad Arif, Manal Alghamdi, Mohammed A. Al Ghamdi:
WideHRNet: An Efficient Model for Human Pose Estimation Using Wide Channels in Lightweight High-Resolution Network. IEEE Access 12: 148990-149000 (2024) - [j32]Murtaza Ali Khan, Mohammed A. AlGhamdi:
A customized deep learning-based framework for classification and analysis of social media posts to enhance the Hajj and Umrah services. Expert Syst. Appl. 238(Part E): 122204 (2024) - [j31]Mohammed A. Al Ghamdi, Muhammad Shahid Bhatti, Atif Saeed, Zeeshan Gillani, Sultan H. Almotiri:
A fusion of BERT, machine learning and manual approach for fake news detection. Multim. Tools Appl. 83(10): 30095-30112 (2024) - [j30]Muhammad Adnan Khan, Mohammed A. AlGhamdi:
An intelligent and fast system for detection of grape diseases in RGB, grayscale, YCbCr, HSV and L*a*b* color spaces. Multim. Tools Appl. 83(17): 50381-50399 (2024) - [j29]Shavez Mushtaq Qureshi, Atif Saeed, Sultan H. Almotiri, Farooq Ahmad, Mohammed A. Al Ghamdi:
Deepfake forensics: a survey of digital forensic methods for multimodal deepfake identification on social media. PeerJ Comput. Sci. 10: e2037 (2024) - 2023
- [j28]Mohammed A. Al Ghamdi:
A Fine-Grained System Driven of Attacks Over Several New Representation Techniques Using Machine Learning. IEEE Access 11: 96615-96625 (2023) - [j27]Sultan H. Almotiri, Mohd Nadeem, Mohammed A. Al Ghamdi, Raees Ahmad Khan:
Analytic Review of Healthcare Software by Using Quantum Computing Security Techniques. Int. J. Fuzzy Log. Intell. Syst. 23(3): 336-352 (2023) - [j26]Esraa Samkari, Muhammad Arif, Manal Alghamdi, Mohammed A. Al Ghamdi:
Human Pose Estimation Using Deep Learning: A Systematic Literature Review. Mach. Learn. Knowl. Extr. 5(4): 1612-1659 (2023) - [j25]Sadia Ramzan, Aqsa Aqdus, Vinayakumar Ravi, Deepika Koundal, Rashid Amin, Mohammed A. Al Ghamdi:
Healthcare Applications Using Blockchain Technology: Motivations and Challenges. IEEE Trans. Engineering Management 70(8): 2874-2890 (2023) - 2022
- [j24]Mohammed A. AlGhamdi:
An Optimized and Secure Energy-Efficient Blockchain-Based Framework in IoT. IEEE Access 10: 133682-133697 (2022) - [j23]Khalid Masood, Muhammad Adnan Khan, Usman Saeed, Mohammad A. Alghamdi, Muhammad Asif, Muhammad Arfan:
Semantic Analysis to Identify Students' Feedback. Comput. J. 65(4): 918-925 (2022) - [j22]Ashar Ahmad, Muhammad Saad, Mohammed A. AlGhamdi, DaeHun Nyang, David Mohaisen:
BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails. IEEE Syst. J. 16(1): 1367-1378 (2022) - 2021
- [j21]Syeda Iqra Hassan, Muhammad Mansoor Alam, Usman Illahi, Mohammad A. Alghamdi, Sultan H. Almotiri, Mazliham Mohd Su'ud:
A Systematic Review on Monitoring and Advanced Control Strategies in Smart Agriculture. IEEE Access 9: 32517-32548 (2021) - [j20]Lubna Nadeem, Muhammad Awais Azam, Yasar Amin, Mohammed A. AlGhamdi, Kok Keong Chai, Muhammad Faisal Nadeem Khan, Muhammad Adnan Khan:
Integration of D2D, Network Slicing, and MEC in 5G Cellular Networks: Survey and Challenges. IEEE Access 9: 37590-37612 (2021) - [j19]Mehar-Un-Nisa Khursheed, Mohammed A. Alghamdi, Muhammad Faisal Nadeem Khan, Ahmed Khalil Khan, Irfan Khan, Ali Ahmed, Arooj Tariq Kiani, Muhammad Adnan Khan:
PV Model Parameter Estimation Using Modified FPA With Dynamic Switch Probability and Step Size Function. IEEE Access 9: 42027-42044 (2021) - [j18]Lubna Nadeem, Muhammad Awais Azam, Yasar Amin, Mohammad A. Alghamdi, Kok Keong Chai, Muhammad Faisal Nadeem Khan, Muhammad Adnan Khan:
Corrections to "Integration of D2D, Network Slicing, and MEC in 5G Cellular Networks: Survey and Challenges". IEEE Access 9: 49660-49661 (2021) - [j17]Zahid Hussain Qaisar, Sultan H. Almotiri, Mohammad A. Alghamdi, Arfan Ali Nagra, Ghulam Ali:
A Scalable and Efficient Multi-Agent Architecture for Malware Protection in Data Sharing Over Mobile Cloud. IEEE Access 9: 76248-76259 (2021) - [j16]Dur-E.-Maknoon Nisar, Rashid Amin, Noor-Ul-Huda Shah, Mohammed A. AlGhamdi, Sultan H. Almotiri, Meshrif Alruily:
Healthcare Techniques Through Deep Learning: Issues, Challenges and Opportunities. IEEE Access 9: 98523-98541 (2021) - [j15]Aysha Maryam Ali, Mohammed A. Al Ghamdi, Muhammad Munwar Iqbal, Shehzad Khalid, Hamza Aldabbas, Saqib Saeed:
Next-generation UWB antennas gadgets for human health care using SAR. EURASIP J. Wirel. Commun. Netw. 2021(1): 33 (2021) - [j14]Aysha Maryam Ali, Mohammed A. Al Ghamdi, Muhammad Munwar Iqbal, Shehzad Khalid, Hamza Aldabbas, Saqib Saeed:
Correction to: Next-generation UWB antennas gadgets for human health care using SAR. EURASIP J. Wirel. Commun. Netw. 2021(1): 126 (2021) - [j13]Umair Khadam, Muhammad Munwar Iqbal, Meshrif Alruily, Mohammad A. Alghamdi, Muhammad Ramzan, Sultan H. Almotiri:
Erratum to "Text Data Security and Privacy in the Internet of Things: Threats, Challenges, and Future Directions". Wirel. Commun. Mob. Comput. 2021: 4127341:1-4127341:1 (2021) - 2020
- [j12]Nadeem Iqbal, Muhammad Hanif, Sagheer Abbas, Muhammad Adnan Khan, Sultan H. Almotiri, Mohammad A. Alghamdi:
DNA Strands Level Scrambling Based Color Image Encryption Scheme. IEEE Access 8: 178167-178182 (2020) - [j11]Umair Khadam, Muhammad Munwar Iqbal, Meshrif Alruily, Mohammed A. AlGhamdi, Muhammad Ramzan, Sultan H. Almotiri:
Text Data Security and Privacy in the Internet of Things: Threats, Challenges, and Future Directions. Wirel. Commun. Mob. Comput. 2020: 7105625:1-7105625:15 (2020)
2010 – 2019
- 2019
- [j10]Khalid Masood, Mohammed A. Alghamdi:
Modeling Mental Stress Using a Deep Learning Framework. IEEE Access 7: 68446-68454 (2019) - 2016
- [c12]Sultan H. Almotiri, Murtaza Ali Khan, Mohammed A. Alghamdi:
Mobile Health (m-Health) System in the Context of IoT. FiCloud Workshops 2016: 39-42 - 2015
- [j9]Naseer Shahzad, Óscar Valero, Mohammed A. Alghamdi, Maryam A. Alghamdi:
A fixed point theorem in partial quasi-metric spaces and an application to Software Engineering. Appl. Math. Comput. 268: 1292-1301 (2015) - [j8]Stevo Stevic, Mohammed A. Alghamdi, Abdullah M. Alotaibi:
Boundedness character of the recursive sequence. Appl. Math. Lett. 50: 83-90 (2015) - [c11]Mohammed A. AlGhamdi:
Applying innovative ehealth to improve patient experience within healthcare organizations in the Kingdom of Saudi Arabia. HealthCom 2015: 346-349 - [c10]Mohammed A. AlGhamdi, Murtaza Ali Khan, Sultan H. Almotiri:
Automatic motion tracking of a human in a surveillance video. ISC2 2015: 1-4 - [c9]Meshrif Alruily, Mohammad A. Alghamdi:
Extracting information of future events from Arabic newspapers: an overview. ICSC 2015: 444-447 - [c8]Malik S. K. Awan, Mohammed A. AlGhamdi, Sultan H. Almotiri, Pete Burnap, Omer F. Rana:
A classification framework for distinct cyber-attacks based on occurrence patterns. SIN 2015: 165-168 - [c7]Nadeem Chaudhary, Mohammad A. Alghamdi:
Scheduling Workflows under Authorization Control. UCC 2015: 583-588 - 2014
- [j7]Stevo Stevic, Mohammad A. Alghamdi, Abdullah M. Alotaibi, Naseer Shahzad:
Long-term behavior of positive solutions of a system of max-type difference equations. Appl. Math. Comput. 235: 567-574 (2014) - [j6]Stevo Stevic, Mohammed A. Alghamdi, Abdullah M. Alotaibi, Naseer Shahzad:
More on a rational second-order difference equation. Appl. Math. Comput. 236: 565-571 (2014) - [j5]Stevo Stevic, Mohammed A. Alghamdi, Abdullah M. Alotaibi, Naseer Shahzad:
Eventual periodicity of some systems of max-type difference equations. Appl. Math. Comput. 236: 635-641 (2014) - [j4]Mohammad A. Alghamdi, Naseer Shahzad, Habtu Zegeye:
Strong Convergence Theorems for Quasi-Bregman Nonexpansive Mappings in Reflexive Banach Spaces. J. Appl. Math. 2014: 580686:1-580686:9 (2014) - [c6]Mohammed A. AlGhamdi:
Proactive Workload Forecasting Model with Dynamic Resource Allocation for Modern Internet Application. UCC 2014: 396-403 - [c5]Asma Saleem, Khadim Hussain Asif, Ahmad Ali, Shahid Mahmood Awan, Mohammed A. Alghamdi:
Pre-processing Methods of Data Mining. UCC 2014: 451-456 - 2013
- [j3]Stevo Stevic, Mohammad A. Alghamdi, Abdullah M. Alotaibi, Naseer Shahzad:
On a nonlinear second order system of difference equations. Appl. Math. Comput. 219(24): 11388-11394 (2013) - [j2]Mohammed A. Alghamdi, Mohammad Mursaleen:
Hankel matrix transformation of the Walsh-Fourier series. Appl. Math. Comput. 224: 278-282 (2013) - 2012
- [b1]Mohammed A. Al Ghamdi:
Predictive dynamic resource allocation for web hosting environments. University of Warwick, Coventry, UK, 2012 - 2011
- [j1]Mohammad A. Alghamdi, Shahrazad H. Alnafei, Stojan Radenovic, Naseer Shahzad:
Fixed point theorems for convex contraction mappings on cone metric spaces. Math. Comput. Model. 54(9-10): 2020-2026 (2011) - [c4]Mohammad A. Alghamdi, Adam P. Chester, Ligang He, Stephen A. Jarvis, James Wen Jun Xue:
Dynamic Active Window Management: A Method for Improving Revenue Generation in Dynamic Enterprise Systems. CIT 2011: 23-28 - [c3]Adam P. Chester, Matthew Leeke, Mohammad A. Alghamdi, Arshad Jhumka, Stephen A. Jarvis:
A Framework for Data Center Scale Dynamic Resource Allocation Algorithms. CIT 2011: 67-74 - [c2]Mohammad A. Alghamdi, Adam P. Chester, Ligang He, Stephen A. Jarvis:
Dynamic Resource Allocation and Active Predictive Models for Enterprise Applications. CLOSER 2011: 551-562 - 2010
- [c1]Mohammad A. Alghamdi, Adam P. Chester, Stephen A. Jarvis:
Predictive and Dynamic Resource Allocation for Enterprise Applications. CIT 2010: 2776-2783
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint