Abdalla Alameen

Orcid: 0000-0003-4197-4859

According to our database1, Abdalla Alameen authored at least 15 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Artificial Ecosystem-Based Optimization with Dwarf Mongoose Optimization for Feature Selection and Global Optimization Problems.
Int. J. Comput. Intell. Syst., December, 2023

2022
Repeated Attribute Optimization for Big Data Encryption.
Comput. Syst. Sci. Eng., 2022

2021
Enhancement of network lifetime of cloud-assisted internet of things: new contribution of deer hunting and particle swarm optimisation.
Int. J. Commun. Networks Distributed Syst., 2021

Functionality Aware Dynamic Composition of Web Services.
Comput. Syst. Sci. Eng., 2021

Multi Criteria Decision Making System for Parking System.
Comput. Syst. Sci. Eng., 2021

2020
Fitness rate-based rider optimization enabled for optimal task scheduling in cloud.
Inf. Secur. J. A Glob. Perspect., 2020

Optimization Driven Deep Learning Approach for Health Monitoring and Risk Assessment in Wireless Body Sensor Networks.
Int. J. Bus. Data Commun. Netw., 2020

A Three Layered Decentralized IoT Biometric Architecture for City Lockdown During COVID-19 Outbreak.
IEEE Access, 2020

Unified Dynamic Bandwidth Allocation Scheme for Ethernet Passive Optical Network.
IEEE Access, 2020

2019
Implementing Adaptive e-Learning Conceptual Model: A Survey and Comparison with Open Source LMS.
Int. J. Emerg. Technol. Learn., 2019

Clustering and Classification based real time analysis of health monitoring and risk assessment in Wireless Body Sensor Networks.
Bio Algorithms Med Syst., 2019

2018
An Online Lab Examination Management System (OLEMS) to Avoid Malpractice.
Sci. Eng. Ethics, 2018

A Proposal to Detect the Double Submission of a Manuscript Sent for Review.
Sci. Eng. Ethics, 2018

Performance evaluation of framework of VoIP/SIP server under virtualization environment along with the most common security threats.
Neural Comput. Appl., 2018

2013
The technical feasibility and security of e-voting.
Int. Arab J. Inf. Technol., 2013


  Loading...