Abdullah Al-Dhelaan

Orcid: 0000-0003-0318-7627

According to our database1, Abdullah Al-Dhelaan authored at least 84 papers between 1995 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Aggregated squeeze-and-excitation transformations for densely connected convolutional networks.
Vis. Comput., 2022

Weighted enclosing subgraph-based link prediction for complex network.
EURASIP J. Wirel. Commun. Netw., 2022

2021
Bi-Tier Differential Privacy for Precise Auction-Based People-Centric IoT Service.
IEEE Access, 2021

Bus-based WSMP Dissemination Protocol for Vehicular Network.
Proceedings of the iiWAS2021: The 23rd International Conference on Information Integration and Web Intelligence, Linz, Austria, 29 November 2021, 2021

2020
Multi-view network embedding with node similarity ensemble.
World Wide Web, 2020

Multiple clustering and selecting algorithms with combining strategy for selective clustering ensemble.
Soft Comput., 2020

Smartphone Architecture for Edge-Centric IoT Analytics.
Sensors, 2020

LGIEM: Global and local node influence based community detection.
Future Gener. Comput. Syst., 2020

2019
A privacy preserving location service for cloud-of-things system.
J. Parallel Distributed Comput., 2019

Deep rolling: A novel emotion prediction model for a multi-participant communication context.
Inf. Sci., 2019

ICRA: index based cache replacement algorithm for cloud storage.
Int. J. Sens. Networks, 2019

Natural disaster topic extraction in Sina microblogging based on graph analysis.
Expert Syst. Appl., 2019

Sign Prediction on Unlabeled Social Networks Using Branch and Bound Optimized Transfer Learning.
Complex., 2019

Diversity Combining Type I-Hybrid ARQ protocol over <i>m</i>-ary Asymmetric Varshamov channels.
Comput. Electr. Eng., 2019

$\mathcal{K}$ -Lowest-Influence Overlapping Nodes Based Community Detection in Complex Networks.
IEEE Access, 2019

SWNF: Sign Prediction of Weak Ties Based on the Network Features.
IEEE Access, 2019

2018
Protection of location privacy for moving <i>k</i>NN queries in social networks.
Appl. Soft Comput., 2018

A Comparative Study of Subgraph Matching Isomorphic Methods in Social Networks.
IEEE Access, 2018

Weighted Greedy Dual Size Frequency Based Caching Replacement Algorithm.
IEEE Access, 2018

Improving Label Noise Filtering by Exploiting Unlabeled Data.
IEEE Access, 2018

2017
Phase-preserving approach in denoising computed tomography medical images.
Comput. methods Biomech. Biomed. Eng. Imaging Vis., 2017

A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems.
IEEE Access, 2017

2016
The efficiency of buffer and buffer-less data-flow control schemes for congestion avoidance in Networks on Chip.
J. King Saud Univ. Comput. Inf. Sci., 2016

Three connected dominating set algorithms for wireless sensor networks.
Int. J. Sens. Networks, 2016

LED: A fast overlapping communities detection algorithm based on structural clustering.
Neurocomputing, 2016

An efficient and scalable density-based clustering algorithm for datasets with complex structures.
Neurocomputing, 2016

A Collaborative Filtering Recommendation Algorithm Based on Hierarchical Structure and Time Awareness.
IEICE Trans. Inf. Syst., 2016

A secure service provisioning framework for cyber physical cloud computing systems.
CoRR, 2016

Detect structural-connected communities based on BSCHEF in C-DBLP.
Concurr. Comput. Pract. Exp., 2016

2015
Edge disjoint Hamiltonian cycles in Eisenstein-Jacobi networks.
J. Parallel Distributed Comput., 2015

Iterative adaptive subdivision surface approach to reduce memory consumption in rendering process (IteAS).
J. Intell. Fuzzy Syst., 2015

Image-Based Object Identification for Efficient Event-Driven Sensing in Wireless Multimedia Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Social Network and Tag Sources Based Augmenting Collaborative Recommender System.
IEICE Trans. Inf. Syst., 2015

Distributed back-pressure scheduling with opportunistic routing in cognitive radio networks.
EURASIP J. Wirel. Commun. Netw., 2015

An innovative technique for contrast enhancement of computed tomography images using normalized gamma-corrected contrast-limited adaptive histogram equalization.
EURASIP J. Adv. Signal Process., 2015

Collaborative Bibliographic System for Review/Survey Articles.
CoRR, 2015

KDVEM : a k-degree anonymity with vertex and edge modification algorithm.
Computing, 2015

Weighted curvature-preserving PDE image filtering method.
Comput. Math. Appl., 2015

Marker Hiding Methods: Applications in Augmented Reality.
Appl. Artif. Intell., 2015

2014
AP Association for Proportional Fairness in Multirate WLANs.
IEEE/ACM Trans. Netw., 2014

Generalized Hypercubes: Edge-Disjoint Hamiltonian Cycles and Gray Codes.
IEEE Trans. Computers, 2014

Efficient Scheme for Congestion Control in Network-on-Chip with QoS consideration.
J. Circuits Syst. Comput., 2014

A New Energy-Efficient Neighbor Discovery and Load Balancing Protocol for Mobile Sensor Networks.
J. Circuits Syst. Comput., 2014

Distributed Energy-Efficient Approaches for Connected Dominating Set Construction in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Intelligent fuzzy approach for fast fractal image compression.
EURASIP J. Adv. Signal Process., 2014

Evaluation of Current Documents Image Denoising Techniques: A Comparative Study.
Appl. Artif. Intell., 2014

Flow control solution for efficient communication and congestion avoidance in NoC.
Proceedings of the 27th IEEE International System-on-Chip Conference, 2014

A Shape-Based Object Identification Scheme in Wireless Multimedia Sensor Networks.
Proceedings of the New Research in Multimedia and Internet Systems, 2014

A Buffered Flow Control Scheme with Flit Weight-Based Dropping Mechanism for Efficient Communication in NoC.
Proceedings of the IEEE 8th International Symposium on Embedded Multicore/Manycore SoCs, 2014

Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Q-Routing in Cognitive Packet Network Routing Protocol for MANETs.
Proceedings of the NCTA 2014 - Proceedings of the International Conference on Neural Computation Theory and Applications, part of IJCCI 2014, Rome, Italy, 22, 2014

Threat-based evaluation for context-aware multimedia surveillance system.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Low power scheme for image based object identification in wireless multimedia sensor networks.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

2013
Connected dominating set algorithms for wireless sensor networks.
Int. J. Sens. Networks, 2013

Integrated Protocols to Ensure Security Services in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

An Efficient Biometric Authentication Protocol for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

A distributed self-healing algorithm for virtual backbone construction and maintenance in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Wireless for Space and Extreme Environments, 2013

Distributed Algorithm for Connected Dominating Set Construction in Sensor Networks.
Proceedings of the IEEE International Conference on Systems, 2013

Queuing modeling for delay analysis in mission oriented sensor networks under the protocol interference model.
Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking, 2013

EDGS: Efficient data gathering scheme for dense Wireless Sensor Networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2012
Two Connected Dominating Set Algorithms for Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Towards Efficient Security Services in Wireless Sensor Networks.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

Biometric access control for wireless nodes.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
Implementation and Evaluation of Network Intrusion Detection Systems.
Proceedings of the Network Performance Engineering, 2011

Percolation theory based connectivity and latency analysis of cognitive radio ad hoc networks.
Wirel. Networks, 2011

Achieving Proportional Fairness via AP Power Control in Multi-Rate WLANs.
IEEE Trans. Wirel. Commun., 2011

Performance Evaluation Study of Intrusion Detection Systems.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

On network connectivity of wireless sensor networks for sandstorm monitoring.
Comput. Networks, 2011

A Model-Based Approach for Outlier Detection in Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011

BorderSense: Border patrol through advanced wireless sensor networks.
Ad Hoc Networks, 2011

MISE-PIPE: Magnetic induction-based wireless sensor networks for underground pipeline monitoring.
Ad Hoc Networks, 2011

Load Balancing Access Point Association Schemes for IEEE 802.11 Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Topology Analysis of Wireless Sensor Networks for Sandstorm Monitoring.
Proceedings of IEEE International Conference on Communications, 2011

A cooperative intrusion detection scheme for clustered mobile ad hoc networks.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Efficient Recovery Control Channel Design in Cognitive Radio Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2010

Efficient Route Discovery Algorithm for MANETs.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

Dynamic Connectivity of Cognitive Radio Ad-Hoc Networks with Time-Varying Spectral Activity.
Proceedings of the Global Communications Conference, 2010

2002
On the attractiveness of the star network.
J. Syst. Softw., 2002

1999
Planning information networks: the scope and the customer issues.
Int. J. Netw. Manag., 1999

1998
Editorial.
Telecommun. Syst., 1998

1996
Computer Simulation for the Evaluation of the IBM-SNA CongestionManagement Method on GULFNET.
Int. J. Netw. Manag., 1996

A Methodology for Network Topology Design with Link and Node Failuresy Tolerance.
Int. J. Netw. Manag., 1996

1995
Information networks awareness and utilization issues: The case of gulfnet.
Int. J. Netw. Manag., 1995

A Mathematical Model for the Investigations of Access Demands on Information Networks with Applications.
Int. J. Netw. Manag., 1995


  Loading...