Mohammed Najah Mahdi

Orcid: 0000-0001-8718-6458

Affiliations:
  • Universiti Tenaga Nasional, Kajang, Malaysia


According to our database1, Mohammed Najah Mahdi authored at least 14 papers between 2018 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Image Encryption Based on Local Fractional Derivative Complex Logistic Map.
Symmetry, 2022

2021
A Conceptual Framework to Aid Attribute Selection in Machine Learning Student Performance Prediction Models.
Int. J. Interact. Mob. Technol., August, 2021

An artificial intelligence approach to monitor student performance and devise preventive measures.
Smart Learn. Environ., 2021

Machine Learning Prediction and Recommendation Framework to Support Introductory Programming Course.
Int. J. Emerg. Technol. Learn., 2021

Symptoms-Based Network Intrusion Detection System.
Proceedings of the Advances in Visual Informatics, 2021

Use of Faceted Search: The Effect on Researchers.
Proceedings of the Advances in Visual Informatics, 2021

Minimizing Classification Errors in Imbalanced Dataset Using Means of Sampling.
Proceedings of the Advances in Visual Informatics, 2021

Feasibility Study of Wind Energy Generation Systems in Masirah Island: Real Case Study.
Proceedings of the International Conference on Electrical Engineering and Informatics, 2021

A Short Review: Issues and Threats Pertaining the Security of SCADA Systems.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021

2020
Solution for Information Overload Using Faceted Search-A Review.
IEEE Access, 2020

Review of Techniques in Faceted Search Applications.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Compromising the Data Integrity of an Electrical Power Grid SCADA System.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

2019
An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

2018
Similarity Search Techniques in Exploratory Search: A Review.
Proceedings of the TENCON 2018, 2018


  Loading...