default search action
Mohammad Aljaidi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Santosh Kumar Bairappaka, Anumoy Ghosh, Omprakash Kaiwartya, Mohammad Aljaidi, Yue Cao, Rupak Kharel:
A Novel Design of Broadband Circularly Polarized Rectenna With Enhanced Gain for Energy Harvesting. IEEE Access 12: 65583-65594 (2024) - [j16]Pradeep Kumar Tiwari, Shiv Prakash, Animesh Tripathi, Mohammad Aljaidi, Narendra Kumar Shukla, Omprakash Kaiwartya, Rupak Kharel:
A Novel Model for Vehicular Delay Tolerant Networks Using Deterministic Bundle Relaying Scheme. IEEE Access 12: 68916-68925 (2024) - [j15]Olusola Adeniyi, Ali Safaa Sadiq, Prashant Pillai, Mohammad Aljaidi, Omprakash Kaiwartya:
Securing Mobile Edge Computing Using Hybrid Deep Learning Method. Comput. 13(1): 25 (2024) - [j14]Mohammad Aljaidi, Omprakash Kaiwartya, Ghassan Samara, Ayoub Alsarhan, Mufti Mahmud, Sami M. Alenezi, Raed Alazaidah, Jaime Lloret:
Green Communication in IoT for Enabling Next-Generation Wireless Systems. Comput. 13(10): 251 (2024) - [j13]Waleed Shahjehan, Rajkumar Singh Rathore, Syed Waqar Shah, Mohammad Aljaidi, Ali Safaa Sadiq, Omprakash Kaiwartya:
A Review on Millimeter-Wave Hybrid Beamforming for Wireless Intelligent Transport Systems. Future Internet 16(9): 337 (2024) - [j12]Ramesh Kumar, Mohammad Aljaidi, Manish Kumar Singla, Anupma Gupta, Ahmed Mershed Alhomoud, Amjad A. Alsuwaylimi, Sami M. Alenezi:
Development of a Prototype Global Positioning System Based Stick for Blind Patients. Int. J. Online Biomed. Eng. 20(8): 21-36 (2024) - [j11]Priyanka Gaba, Ram Shringar Raw, Omprakash Kaiwartya, Mohammad Aljaidi:
B-SAFE: Blockchain-Enabled Security Architecture for Connected Vehicle Fog Environment. Sensors 24(5): 1515 (2024) - [j10]Muhammad Rizwan Ghori, Tat Chee Wan, Gian Chand Sodhy, Mohammad Aljaidi, Amna Rizwan, Ali Safaa Sadiq, Omprakash Kaiwartya:
Enhancing Reliability and Stability of BLE Mesh Networks: A Multipath Optimized AODV Approach. Sensors 24(18): 5901 (2024) - [j9]Hasan Gharaibeh, Rabia Emhamed Al Mamlook, Ghassan Samara, Ahmad Nasayreh, Saja Smadi, Khalid M. O. Nahar, Mohammad Aljaidi, Essam Al Daoud, Mohammad A. Gharaibeh, Laith Abualigah:
Arabic sentiment analysis of Monkeypox using deep neural network and optimized hyperparameters of machine learning algorithms. Soc. Netw. Anal. Min. 14(1): 30 (2024) - [j8]Manish Kumar Singla, Jyoti Gupta, Mohammed H. Alsharif, Mun-Kyeom Kim, Mohammad Aljaidi, Murodbek Safaraliev:
A robust multi-objective optimization algorithm for accurate parameter estimation for solar cell models. Soft Comput. 28(19): 11265-11277 (2024) - [j7]Ahmad Nasayreh, Rabia Emhamed Al Mamlook, Ghassan Samara, Hasan Gharaibeh, Mohammad Aljaidi, Dalia Alzu'bi, Essam Al Daoud, Laith Abualigah:
Arabic Sentiment Analysis for ChatGPT Using Machine Learning Classification Algorithms: A Hyperparameter Optimization Technique. ACM Trans. Asian Low Resour. Lang. Inf. Process. 23(3): 36 (2024) - [i2]Sohag Kumar Mondal, Md. Simul Hasan Talukder, Mohammad Aljaidi, Rejwan Bin Sulaiman, Md Mohiuddin Sarker Tushar, Amjad A. Alsuwaylimi:
BloodCell-Net: A lightweight convolutional neural network for the classification of all microscopic blood cell images of the human body. CoRR abs/2405.14875 (2024) - 2023
- [j6]Hasan Idhaim, Yousef Kilani, Ayoub Alsarhan, Mohammad Aljaidi, Ala Altaweel, Ahmed Bouridane, Amjad Aldweesh:
Improving Recommender Systems by a Further Factorization of the Factor Matrices. IEEE Access 11: 91539-91549 (2023) - [j5]Bashar Igried, Atalla Fahed Al-Serhan, Ayoub Alsarhan, Mohammad Aljaidi, Amjad Aldweesh:
Machine Learning Failure-Aware Scheme for Profit Maximization in the Cloud Market. Future Internet 15(1): 1 (2023) - [j4]Ali Mohd Ali, Mohammad R. Hassan, Ahmad Al-Qerem, Ala Hamarsheh, Khaled E. Al-Qawasmi, Mohammad Aljaidi, Ahmed Abu-Khadrah, Omprakash Kaiwartya, Jaime Lloret:
Towards a Smart Environment: Optimization of WLAN Technologies to Enable Concurrent Smart Services. Sensors 23(5): 2432 (2023) - [j3]Safa Hamdare, Omprakash Kaiwartya, Mohammad Aljaidi, Manish Jugran, Yue Cao, Sushil Kumar, Mufti Mahmud, David J. Brown, Jaime Lloret:
Cybersecurity Risk Analysis of Electric Vehicles Charging Stations. Sensors 23(15): 6716 (2023) - [j2]Ankit Manderna, Sushil Kumar, Upasana Dohare, Mohammad Aljaidi, Omprakash Kaiwartya, Jaime Lloret:
Vehicular Network Intrusion Detection Using a Cascaded Deep Learning Approach with Multi-Variant Metaheuristic. Sensors 23(21): 8772 (2023) - [c14]Mohammad Aljaidi:
A Comprehensive Technical Analysis of URL Redirect Attacks: A Case Study of British Airways Data Breach. ACIT 2023: 1-5 - [c13]Mazen Alzyoud, Raed Alazaidah, Haneen Alzoubi, Najah Al-Shanableh, Mohammad Aljaidi, Sattam Almatarneh:
Toward Identifying The Best Base Classifier in Multi Label Classification-an Investigative Study. ACIT 2023: 1-9 - [c12]Hasan Idhaim, Mohammad Aljaidi, Ghassan Samara, Mais Haj Qasem, Ayoub Alsarhan, Muhammad Khalid:
Internal Hidden Processing Model-Based for SELECT Command in Structured Query Language. ACIT 2023: 1-6 - [c11]Rabia Emhamed Al Mamlook, Ahmad Nasayreh, Hasan Gharaibeh, Mohammad Aljaidi, Qais Al-Na'amneh, Dalia Alzu'bi, Hanin Fawzi Bzizi, Abdelrahman Abdeltawab:
Fine-Tuning Pre-Trained Models for Automated Analysis of Ophthalmic Imaging in Diagnosing Eye Diseases. ACIT 2023: 1-6 - [c10]Ghassan Samara, Alaa Elhilo, Mahmoud Rajallah Asassfeh, MohammadNoor Injadat, Mais Haj Qasem, Raed Alazaidah, Mohammad Aljaidi, Nabeel Al-Milli, Adnan A. Hnaif:
Optimizing Road Safety through Intelligent Congestion Management. ACIT 2023: 1-7 - [c9]Ayoub Alsarhan, Bashar Igried, Raad Mohammad Bani Saleem, Mohammad Alauthman, Mohammad Aljaidi:
Enhancing Phishing URL Detection: A Comparative Study of Machine Learning Algorithms. AIMLR 2023: 5:1-5:7 - [c8]Essam Al Daoud, Ghassan Samara, Laith Al Daoud, Mohammad Aljaidi:
A Comparative Study of Transformers Embeddings for Question Answering in Arabic Private Documents. BCD 2023: 5-9 - 2022
- [c7]Mohammad Aljaidi, Nauman Aslam, Ghassan Samara, Sattam Almatarneh, Khaled E. Al-Qawasmi, Abdullah Al-Qammaz:
EV Charging Station Placement and Sizing Techniques: Survey, Challenges and Directions for Future Work. ACIT 2022: 1-6 - [c6]Sattam Almatarneh, Israa Abdullah Almatarneh, Ghassan Samara, Mohammad Aljaidi, Amneh Alamleh, Aref Abuawad:
Polarity Classification of Hotel Reviews: Lexicon-Based Method. ACIT 2022: 1-4 - [c5]Ghassan Samara, Ghassan M. Alsayyed, Mohammad Aljaidi, Sattam Almatarneh, Feras Almashakbah, Firas Omar:
Internet of Robotic Things in Early Childhood Education: Domains and Challenges. ACIT 2022: 1-7 - [c4]Ghassan Samara, Mohammad Aljaidi, Essam Al Daoud, Maram Y. Al-Safarini, Ghassan M. Alsayyed, Sattam Almatarneh:
Message Broadcasting Algorithm Implementation Using Mobile Long Term Evolution and Narrow Band Internet of Things Over Intelligent Transportation System (ITS). ACIT 2022: 1-7 - [c3]Ghassan Samara, Mohammed Bhaa Eid, Mohammad Aljaidi, Sattam Almatarneh, Mohammed Rasmi, Raed Alazaideh, Yasser Al-Lahham:
Vulnerabilities in Vehicular Ad Hoc Networks and Possible Countermeasures. ACIT 2022: 1-5 - [c2]Mohammad Aljaidi, Nauman Aslam, Xiaomin Chen, Omprakash Kaiwartya, Yousef Ali Al-Gumaei, Muhammad Khalid:
A Reinforcement Learning-based Assignment Scheme for EVs to Charging Stations. VTC Spring 2022: 1-7 - 2020
- [c1]Mohammad Aljaidi, Nauman Aslam, Xiaomin Chen, Omprakash Kaiwartya, Yousef Ali Al-Gumaei:
Energy-efficient EV Charging Station Placement for E-Mobility. IECON 2020: 3672-3678
2010 – 2019
- 2019
- [i1]Ghassan Samara, Mohammad Aljaidi:
Efficient energy, cost reduction, and QoS based routing protocol for wireless sensor networks. CoRR abs/1903.09636 (2019) - 2018
- [j1]Ghassan Samara, Mohammad Aljaidi:
Aware-routing protocol using best first search algorithm in wireless sensor. Int. Arab J. Inf. Technol. 15(3A): 592-598 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint