BibTeX records: Abdulaziz S. Almazyad

download as .bib file

@article{DBLP:journals/nca/JoudakiMSAR18,
  author    = {Saba Joudaki and
               Dzulkifli Mohamad and
               Tanzila Saba and
               Abdulaziz S. Almazyad and
               Amjad Rehman},
  title     = {Correction to: Fused features mining for depth-based hand gesture
               recognition to classify blind human communication},
  journal   = {Neural Computing and Applications},
  volume    = {29},
  number    = {1},
  pages     = {307},
  year      = {2018},
  url       = {https://doi.org/10.1007/s00521-017-3294-z},
  doi       = {10.1007/s00521-017-3294-z},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/nca/JoudakiMSAR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/AbbasSMRAA18,
  author    = {Naveed Abbas and
               Tanzila Saba and
               Dzulkifli Mohamad and
               Amjad Rehman and
               Abdulaziz S. Almazyad and
               Jarallah S. Al{-}Ghamdi},
  title     = {Machine aided malaria parasitemia detection in Giemsa-stained thin
               blood smears},
  journal   = {Neural Computing and Applications},
  volume    = {29},
  number    = {3},
  pages     = {803--818},
  year      = {2018},
  url       = {https://doi.org/10.1007/s00521-016-2474-6},
  doi       = {10.1007/s00521-016-2474-6},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/nca/AbbasSMRAA18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/Almazyad18,
  author    = {Abdulaziz S. Almazyad},
  title     = {Reputation-based mechanisms to avoid misbehaving nodes in ad hoc and
               wireless sensor networks},
  journal   = {Neural Computing and Applications},
  volume    = {29},
  number    = {9},
  pages     = {597--607},
  year      = {2018},
  url       = {https://doi.org/10.1007/s00521-016-2555-6},
  doi       = {10.1007/s00521-016-2555-6},
  timestamp = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/nca/Almazyad18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AslamASARAK17,
  author    = {Adeel Aslam and
               Naveed Ahmad and
               Tanzila Saba and
               Abdulaziz S. Almazyad and
               Amjad Rehman and
               Adeel Anjum and
               Abid Khan},
  title     = {Decision Support System for Risk Assessment and Management Strategies
               in Distributed Software Development},
  journal   = {{IEEE} Access},
  volume    = {5},
  pages     = {20349--20373},
  year      = {2017},
  url       = {https://doi.org/10.1109/ACCESS.2017.2757605},
  doi       = {10.1109/ACCESS.2017.2757605},
  timestamp = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/access/AslamASARAK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acisc/MohamedA17,
  author    = {Ali Wagdy Mohamed and
               Abdulaziz S. Almazyad},
  title     = {Differential Evolution with Novel Mutation and Adaptive Crossover
               Strategies for Solving Large Scale Global Optimization Problems},
  journal   = {Applied Comp. Int. Soft Computing},
  volume    = {2017},
  pages     = {7974218:1--7974218:18},
  year      = {2017},
  url       = {https://doi.org/10.1155/2017/7974218},
  doi       = {10.1155/2017/7974218},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/acisc/MohamedA17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/JadookiMSAR17,
  author    = {Saba Jadooki and
               Dzulkifli Mohamad and
               Tanzila Saba and
               Abdulaziz S. Almazyad and
               Amjad Rehman},
  title     = {Fused features mining for depth-based hand gesture recognition to
               classify blind human communication},
  journal   = {Neural Computing and Applications},
  volume    = {28},
  number    = {11},
  pages     = {3285--3294},
  year      = {2017},
  url       = {https://doi.org/10.1007/s00521-016-2244-5},
  doi       = {10.1007/s00521-016-2244-5},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/nca/JadookiMSAR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/SabaAR16,
  author    = {Tanzila Saba and
               Abdulaziz S. Almazyad and
               Amjad Rehman},
  title     = {Online versus offline Arabic script classification},
  journal   = {Neural Computing and Applications},
  volume    = {27},
  number    = {7},
  pages     = {1797--1804},
  year      = {2016},
  url       = {https://doi.org/10.1007/s00521-015-2001-1},
  doi       = {10.1007/s00521-015-2001-1},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/nca/SabaAR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AlkawazSSAR16,
  author    = {Mohammed Hazim Alkawaz and
               Ghazali Sulong and
               Tanzila Saba and
               Abdulaziz S. Almazyad and
               Amjad Rehman},
  title     = {Concise analysis of current text automation and watermarking approaches},
  journal   = {Security and Communication Networks},
  volume    = {9},
  number    = {18},
  pages     = {6365--6378},
  year      = {2016},
  url       = {https://doi.org/10.1002/sec.1738},
  doi       = {10.1002/sec.1738},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/AlkawazSSAR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eais/SabaAR15,
  author    = {Tanzila Saba and
               Abdulaziz S. Almazyad and
               Amjad Rehman},
  title     = {Language independent rule based classification of printed {\&}
               handwritten text},
  booktitle = {2015 {IEEE} International Conference on Evolving and Adaptive Intelligent
               Systems, {EAIS} 2015, Douai, France, December 1-3, 2015},
  pages     = {1--4},
  year      = {2015},
  crossref  = {DBLP:conf/eais/2015},
  url       = {https://doi.org/10.1109/EAIS.2015.7368806},
  doi       = {10.1109/EAIS.2015.7368806},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eais/SabaAR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AlmazyadSAABOQ14,
  author    = {Abdulaziz S. Almazyad and
               Yasser Mohammad Seddiq and
               Ahmed M. Alotaibi and
               Ahmed Y. Al{-}nasheri and
               Mohammed S. BenSaleh and
               Abdulfattah Mohammad Obeid and
               Syed Manzoor Qasim},
  title     = {A Proposed Scalable Design and Simulation of Wireless Sensor Network-Based
               Long-Distance Water Pipeline Leakage Monitoring System},
  journal   = {Sensors},
  volume    = {14},
  number    = {2},
  pages     = {3557--3577},
  year      = {2014},
  url       = {https://doi.org/10.3390/s140203557},
  doi       = {10.3390/s140203557},
  timestamp = {Tue, 02 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/sensors/AlmazyadSAABOQ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cicsyn/SeddiqAAABQ13,
  author    = {Yasser Mohammad Seddiq and
               Ahmed M. Alotaibi and
               Ahmed Y. Al{-}nasheri and
               Abdulaziz S. Almazyad and
               Mohammed S. BenSaleh and
               Syed Manzoor Qasim},
  title     = {Evaluation of Energy-Efficient Cooperative Scheme for Wireless Sensor
               Nodes Used in Long Distance Water Pipeline Monitoring Systems},
  booktitle = {Fifth International Conference on Computational Intelligence, Communication
               Systems and Networks, CICSyN 2013, Madrid, Spain, June 5-7, 2013},
  pages     = {107--111},
  year      = {2013},
  crossref  = {DBLP:conf/cicsyn/2013},
  url       = {https://doi.org/10.1109/CICSYN.2013.28},
  doi       = {10.1109/CICSYN.2013.28},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cicsyn/SeddiqAAABQ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/AlmazyadA09,
  author    = {Abdulaziz S. Almazyad and
               Yasir Ahmad},
  title     = {A New Approach in {T-FA} Authentication with {OTP} Using Mobile Phone},
  booktitle = {Security Technology - International Conference, SecTech 2009, Held
               as Part of the Future Generation Information Technology Conference,
               {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings},
  pages     = {9--17},
  year      = {2009},
  crossref  = {DBLP:conf/fgit/2009sectech},
  url       = {https://doi.org/10.1007/978-3-642-10847-1\_2},
  doi       = {10.1007/978-3-642-10847-1\_2},
  timestamp = {Tue, 23 May 2017 01:07:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fgit/AlmazyadA09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/AlmazyadSAK09,
  author    = {Abdulaziz S. Almazyad and
               Mohammad Khubeb Siddiqui and
               Yasir Ahmad and
               Zafar Iqbal Khan},
  title     = {An Incremental View Maintenance Approach Using Version Store in Warehousing
               Environment},
  booktitle = {Database Theory and Application - International Conference, {DTA}
               2009, Held as Part of the Future Generation Information Technology
               Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009.
               Proceedings},
  pages     = {9--16},
  year      = {2009},
  crossref  = {DBLP:conf/fgit/2009dta},
  url       = {https://doi.org/10.1007/978-3-642-10583-8\_2},
  doi       = {10.1007/978-3-642-10583-8\_2},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fgit/AlmazyadSAK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ChenHA95,
  author    = {C. Y. Roger Chen and
               Shuo{-}Hsien Hsiao and
               Abdulaziz S. Almazyad},
  title     = {A new model for the performance evaluation of synchronous circuit
               switched multistage interconnection networks},
  journal   = {{IEEE/ACM} Trans. Netw.},
  volume    = {3},
  number    = {6},
  pages     = {708--715},
  year      = {1995},
  url       = {https://doi.org/10.1109/90.477717},
  doi       = {10.1109/90.477717},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ton/ChenHA95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eais/2015,
  title     = {2015 {IEEE} International Conference on Evolving and Adaptive Intelligent
               Systems, {EAIS} 2015, Douai, France, December 1-3, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7361817/proceeding},
  isbn      = {978-1-4673-6698-4},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eais/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cicsyn/2013,
  editor    = {David Al{-}Dabass and
               Gregorio Romero and
               Alessandra Orsoni and
               Athanasios A. Pantelous},
  title     = {Fifth International Conference on Computational Intelligence, Communication
               Systems and Networks, CICSyN 2013, Madrid, Spain, June 5-7, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6569033/proceeding},
  isbn      = {978-1-4799-0587-4},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cicsyn/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fgit/2009sectech,
  editor    = {Dominik Slezak and
               Tai{-}Hoon Kim and
               Wai{-}Chi Fang and
               Kirk P. Arnett},
  title     = {Security Technology - International Conference, SecTech 2009, Held
               as Part of the Future Generation Information Technology Conference,
               {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings},
  series    = {Communications in Computer and Information Science},
  volume    = {58},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10847-1},
  doi       = {10.1007/978-3-642-10847-1},
  isbn      = {978-3-642-10846-4},
  timestamp = {Tue, 23 May 2017 01:07:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fgit/2009sectech},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fgit/2009dta,
  editor    = {Dominik Slezak and
               Tai{-}Hoon Kim and
               Yanchun Zhang and
               Jianhua Ma and
               Kyo{-}Il Chung},
  title     = {Database Theory and Application - International Conference, {DTA}
               2009, Held as Part of the Future Generation Information Technology
               Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009.
               Proceedings},
  series    = {Communications in Computer and Information Science},
  volume    = {64},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10583-8},
  doi       = {10.1007/978-3-642-10583-8},
  isbn      = {978-3-642-10582-1},
  timestamp = {Tue, 23 May 2017 01:07:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fgit/2009dta},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics