Mohammad A. Alghamdi

According to our database1, Mohammad A. Alghamdi authored at least 27 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
BlockTrail: A Service for Secure and Transparent Blockchain-Driven Audit Trails.
IEEE Syst. J., 2022

Semantic Analysis to Identify Students' Feedback.
Comput. J., 2022

2021
Erratum to "Text Data Security and Privacy in the Internet of Things: Threats, Challenges, and Future Directions".
Wirel. Commun. Mob. Comput., 2021

A Scalable and Efficient Multi-Agent Architecture for Malware Protection in Data Sharing Over Mobile Cloud.
IEEE Access, 2021

Healthcare Techniques Through Deep Learning: Issues, Challenges and Opportunities.
IEEE Access, 2021

Corrections to "Integration of D2D, Network Slicing, and MEC in 5G Cellular Networks: Survey and Challenges".
IEEE Access, 2021

Integration of D2D, Network Slicing, and MEC in 5G Cellular Networks: Survey and Challenges.
IEEE Access, 2021

PV Model Parameter Estimation Using Modified FPA With Dynamic Switch Probability and Step Size Function.
IEEE Access, 2021

A Systematic Review on Monitoring and Advanced Control Strategies in Smart Agriculture.
IEEE Access, 2021

2020
Text Data Security and Privacy in the Internet of Things: Threats, Challenges, and Future Directions.
Wirel. Commun. Mob. Comput., 2020

DNA Strands Level Scrambling Based Color Image Encryption Scheme.
IEEE Access, 2020

2019
Modeling Mental Stress Using a Deep Learning Framework.
IEEE Access, 2019

2016
Mobile Health (m-Health) System in the Context of IoT.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

2015
Boundedness character of the recursive sequence.
Appl. Math. Lett., 2015

A fixed point theorem in partial quasi-metric spaces and an application to Software Engineering.
Appl. Math. Comput., 2015

Scheduling Workflows under Authorization Control.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

A classification framework for distinct cyber-attacks based on occurrence patterns.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Automatic motion tracking of a human in a surveillance video.
Proceedings of the IEEE First International Smart Cities Conference, 2015

Applying innovative ehealth to improve patient experience within healthcare organizations in the Kingdom of Saudi Arabia.
Proceedings of the 17th International Conference on E-health Networking, 2015

2014
Strong Convergence Theorems for Quasi-Bregman Nonexpansive Mappings in Reflexive Banach Spaces.
J. Appl. Math., 2014

Eventual periodicity of some systems of max-type difference equations.
Appl. Math. Comput., 2014

More on a rational second-order difference equation.
Appl. Math. Comput., 2014

Long-term behavior of positive solutions of a system of max-type difference equations.
Appl. Math. Comput., 2014

Pre-processing Methods of Data Mining.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

2013
On a nonlinear second order system of difference equations.
Appl. Math. Comput., 2013

Hankel matrix transformation of the Walsh-Fourier series.
Appl. Math. Comput., 2013

2011
Fixed point theorems for convex contraction mappings on cone metric spaces.
Math. Comput. Model., 2011


  Loading...