default search action
Heba A. Kurdi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j21]Nehal Al-Otaiby, Afnan Alhindi, Heba A. Kurdi:
AntTrust: An Ant-Inspired Trust Management System for Peer-to-Peer Networks. Sensors 22(2): 533 (2022) - [j20]Amal Al-Dawsari, Isra Al-Turaiki, Heba A. Kurdi:
Incremental Ant-Miner Classifier for Online Big Data Analytics. Sensors 22(6): 2223 (2022) - 2021
- [j19]Heba A. Kurdi, Asma Almulifi, Shiroq Al-Megren, Kamal Youcef-Toumi:
A balanced evacuation algorithm for facilities with multiple exits. Eur. J. Oper. Res. 289(1): 285-296 (2021) - [j18]Amjaad Alhaqbani, Heba A. Kurdi, Kamal Youcef-Toumi:
Fish-Inspired Task Allocation Algorithm for Multiple Unmanned Aerial Vehicles in Search and Rescue Missions. Remote. Sens. 13(1): 27 (2021) - [j17]Heba A. Kurdi, Shaden Almuhalhel, Hebah ElGibreen, Hajar Qahmash, Bayan Albatati, Lubna Al-Salem, Ghada Almoaiqel:
Tide-Inspired Path Planning Algorithm for Autonomous Vehicles. Remote. Sens. 13(22): 4644 (2021) - [j16]Alanoud Alhussain, Heba A. Kurdi, Lina Altoaimy:
Managing Trust and Detecting Malicious Groups in Peer-to-Peer IoT Networks. Sensors 21(13): 4484 (2021) - [c30]Faten Aljalaud, Heba A. Kurdi:
Autonomous task allocation for multi-UAV systems based on area-restricted search behavior in animals. FNC/MobiSPC 2021: 246-253 - 2020
- [j15]Heba A. Kurdi, Shiroq Al-Megren, Ebtesam Aloboud, Abeer Ali Alnuaim, Hessah Alomair, Reem Alothman, Alhanouf Ben Muhayya, Noura Alharbi, Manal Alenzi, Kamal Youcef-Toumi:
Bee-inspired task allocation algorithm for multi-UAV search and rescue missions. Int. J. Bio Inspired Comput. 16(4): 252-263 (2020) - [c29]Bashayer AlShehri, Aljawhra Alotaibi, Hind AlQhtani, Alaa AlAli, Heba A. Kurdi:
A Mobile Platform for Social Media Filters. ANT/EDI40 2020: 297-302 - [c28]Roaa Aldawish, Heba A. Kurdi:
A Modified Degree Discount Heuristic for Influence Maximization in Social Networks. ANT/EDI40 2020: 311-316 - [c27]Reham Alshamrani, Fatimah Alshehri, Heba A. Kurdi:
A Preprocessing Technique for Fast Convex Hull Computation. ANT/EDI40 2020: 317-324 - [c26]Alhanoof Althnian, Afnan Abou Elwafa, Nourah Aloboud, Hend Alrasheed, Heba A. Kurdi:
Prediction of COVID-19 Individual Susceptibility using Demographic Data: A Case Study on Saudi Arabia. EUSPN/ICTH 2020: 379-386 - [c25]Ashjan Alotaibi, Alhanouf Almutairi, Heba A. Kurdi:
OneByOne (OBO): A Fast Sorting Algorithm. FNC/MobiSPC 2020: 270-277 - [c24]Latifa Almawas, Afrah Alotaibi, Heba A. Kurdi:
Comparative performance study of classification models for image-splicing detection. FNC/MobiSPC 2020: 278-285
2010 – 2019
- 2019
- [j14]Heba A. Kurdi, Munirah F. Aldaood, Shiroq Al-Megren, Ebtesam Aloboud, Abdulrahman S. Aldawood, Kamal Youcef-Toumi:
Adaptive task allocation for multi-UAV systems based on bacteria foraging behaviour. Appl. Soft Comput. 83 (2019) - [j13]Ponciano Jorge Escamilla-Ambrosio, David Alejandro Robles-Ramírez, Shada Alsalamah, Theo Tryfonas, Sandra Orantes-Jiménez, Abraham Rodriguez-Mota, Sakher Alqahtani, Thamer Nouh, Hessah A. Alsalamah, Shahad Almutawaa, Hend Alkabani, Mshael Alsmari, Nouf Alashgar, Abeer Alrajeh, Heba A. Kurdi:
Securing mHealth Applications Using IoTsecM Security Modelling: Dentify.Me mApp Case Study for Urgent Care Management. Computación y Sistemas 23(4) (2019) - [j12]Heba A. Kurdi, Auhood Abdullah Alfaries, Abeer Al-Anazi, Sarah Al-Kharji, Maimona Addegaither, Lina Altoaimy, Syed Hassan Ahmed:
A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments. J. Supercomput. 75(7): 3534-3554 (2019) - [c23]Arwa Alromih, Heba A. Kurdi:
An energy-efficient gossiping protocol for wireless sensor networks using Chebyshev distance. ANT/EDI40 2019: 1066-1071 - [c22]Ebtesam Aloboud, Heba A. Kurdi:
Cuckoo-inspired Job Scheduling Algorithm for Cloud Computing. ANT/EDI40 2019: 1078-1083 - [c21]Lina Altoaimy, Heba A. Kurdi, Arwa Alromih, Amirah Alomari, Entisar Alrogi, Syed Hassan Ahmed:
Enhanced Distance-Based Gossip Protocols for Wireless Sensor Networks. CCNC 2019: 1-4 - [c20]Heba A. Kurdi, Ghada Al-Hudhud, Muneerah Al-Dawod, Wafa Al-Shaikh, Lina Altoaimy:
Service-Sharing Approach Using a Mutual Exclusion Algorithm for Smart Cashier Systems. CCNC 2019: 1-4 - [c19]Abrar Al Oudah, Kholoud Al Bassam, Heba A. Kurdi, Shiroq Al-Megren:
Wajeez: An Extractive Automatic Arabic Text Summarisation System. HCI (13) 2019: 3-14 - [c18]Alanoud Bin Dris, Najla Alzakari, Heba A. Kurdi:
A Systematic Approach to Identify an Appropriate Classifier for Limited-Sized Data Sets. ISNCC 2019: 1-6 - 2018
- [j11]Heba A. Kurdi, Shaden M. Alismail, Mohammad Mehedi Hassan:
LACE: A Locust-Inspired Scheduling Algorithm to Reduce Energy Consumption in Cloud Datacenters. IEEE Access 6: 35435-35448 (2018) - [j10]Heba A. Kurdi, Fadwa Ezzat, Lina Altoaimy, Syed Hassan Ahmed, Kamal Youcef-Toumi:
MultiCuckoo: Multi-Cloud Service Composition Using a Cuckoo-Inspired Algorithm for the Internet of Things Applications. IEEE Access 6: 56737-56749 (2018) - [j9]Heba A. Kurdi, Ebtesam Aloboud, Maram Alalwan, Sarah Alhassan, Ebtehal T. Alotaibi, Guillermo Bautista, Jonathan P. How:
Autonomous task allocation for multi-UAV systems based on the locust elastic behavior. Appl. Soft Comput. 71: 110-126 (2018) - [j8]Heba A. Kurdi, Shiroq Al-Megren, Reham Althunyan, Asma Almulifi:
Effect of exit placement on evacuation plans. Eur. J. Oper. Res. 269(2): 749-759 (2018) - [j7]Lina Altoaimy, Arwa Alromih, Shiroq Al-Megren, Ghada Al-Hudhud, Heba A. Kurdi, Kamal Youcef-Toumi:
Context-Aware Gossip-Based Protocol for Internet of Things Applications. Sensors 18(7): 2233 (2018) - [j6]Heba A. Kurdi, Bushra Alshayban, Lina Altoaimy, Shada Alsalamah:
TrustyFeer: A Subjective Logic Trust Model for Smart City Peer-to-Peer Federated Clouds. Wirel. Commun. Mob. Comput. 2018 (2018) - [c17]Shiroq Al-Megren, Heba A. Kurdi, Munirah F. Aldaood:
A Multi-UAV Task Allocation Algorithm Combatting Red Palm Weevil Infestation. EUSPN/ICTH 2018: 88-95 - [c16]Fatimah Al-Hafiz, Shiroq Al-Megren, Heba A. Kurdi:
Red blood cell segmentation by thresholding and Canny detector. EUSPN/ICTH 2018: 327-334 - [c15]Alanoud Alhussain, Heba A. Kurdi:
EERP: An enhanced EigenTrust algorithm for reputation management in peer-to-peer networks. EUSPN/ICTH 2018: 490-495 - [c14]Afnan AlMoammar, Lubna AlHenaki, Heba A. Kurdi:
Selecting Accurate Classifier Models for a MERS-CoV Dataset. IntelliSys (1) 2018: 1070-1084 - 2017
- [c13]Laila Bashmal, Asma Almulifi, Heba A. Kurdi:
Hybrid Resource Discovery Algorithms for Unstructured Peer-to-Peer Networks. ANT/SEIT 2017: 289-296 - [c12]Alaa S. Al Qhtani, Alaa S. Al Shammari, Heba A. Kurdi:
A Fast Genetic Algorithm-based Evacuation Plan Generator. ANT/SEIT 2017: 994-998 - [c11]Sarah Al-Kharji, Heba A. Kurdi, Rasha Altamimi, Ebtesam Aloboud:
AuthenticPeer++: A Trust Management System for P2P Networks. EMS 2017: 191-196 - [c10]Alaa AlQhtani, Ebtesam Aloboud, Rasha Altamimi, Heba A. Kurdi:
Impacts of VPNs and Firewalls on Public Cloud Performance. EMS 2017: 197-201 - [c9]Maha Bakalla, Hadeel Al-Jami, Heba A. Kurdi, Shada Alsalamah:
A QoS-aware and energy-efficient genetic resource allocation algorithm for cloud data centers. ICUMT 2017: 244-249 - 2016
- [c8]Amirah Alomari, Heba A. Kurdi:
Enhancing Video Streaming Services by Studying Distance Impact on the QoS in Cloud Computing Environments. 3PGCIC 2016: 243-251 - [c7]Heba A. Kurdi, Sara N. Alfaraj, Asma Alatawi:
SFCS-Broker: Supporting Feedback Credibility Brokering Service for Multiple Clouds Environments. 3PGCIC 2016: 567-576 - 2015
- [j5]Heba A. Kurdi, Abeer Al-Anazi, Carlene E.-A. Campbell, Auhood Abdullah Alfaries:
A combinatorial optimization algorithm for multiple cloud service composition. Comput. Electr. Eng. 42: 107-113 (2015) - [j4]Heba A. Kurdi, Sarah Alnasser, Munira Alhelal:
AuthenticPeer: A Reputation Management System for Peer-to-Peer Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 637831:1-637831:11 (2015) - [j3]Heba A. Kurdi:
HonestPeer: An enhanced EigenTrust algorithm for reputation management in P2P systems. J. King Saud Univ. Comput. Inf. Sci. 27(3): 315-322 (2015) - [c6]Heba A. Kurdi, Amani Al-Fayez, Anfal Al-Tuwaim, Hanan Al-Mohammadi, Mona Al-Mutairi, Sarah Al-Kharji:
Design and Implementation of a Mobile Cloud Environmental Application for Riyadh City. HCI (20) 2015: 380-389 - 2014
- [c5]Heba A. Kurdi, Ebtesam Aloboud, Sarah Alhassan, Ebtehal T. Alotaibi:
An Algorithm for Handling Starvation and Resource Rejection in Public Clouds. FNC/MobiSPC 2014: 242-248 - [c4]Heba A. Kurdi, Ebtehal T. Alotaibi:
A Hybrid Approach for Scheduling Virtual Machines in Private Clouds. FNC/MobiSPC 2014: 249-256 - [c3]Heba A. Kurdi, Safwat H. Hamad, Amal Khalifa:
Towards a Friendly User Interface on the Cloud. HCI (9) 2014: 148-157 - 2013
- [c2]Heba A. Kurdi, Madeeha Enazi, Auhood Abdullah Alfaries:
Evaluating Firewall Models for Hybrid Clouds. EMS 2013: 514-519 - [c1]Ektemal Al-Rayis, Heba A. Kurdi:
Performance Analysis of Load Balancing Architectures in Cloud Computing. EMS 2013: 520-524 - 2011
- [j2]Carlene E.-A. Campbell, Kok-Keong Loo, Heba A. Kurdi, Shafiullah Khan:
Comparison of IEEE 802.11 and IEEE 802.15.4 for Future Green Multichannel Multi-radio Wireless Sensor Networks. Int. J. Commun. Networks Inf. Secur. 3(1) (2011)
2000 – 2009
- 2008
- [j1]Heba A. Kurdi, Maozhen Li, Hamed S. Al-Raweshidy:
A Classification of Emerging and Traditional Grid Systems. IEEE Distributed Syst. Online 9(3) (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint