Follow
Dr. Abeer A.H Aljohani
Dr. Abeer A.H Aljohani
Research Assistant of Computer Science, Taibah University
Verified email at taibahu.edu.sa
Title
Cited by
Cited by
Year
Using mobile computing to provide a smart and secure Internet of Things (IoT) framework for medical applications
RK Kaushal, R Bhardwaj, N Kumar, AA Aljohani, SK Gupta, P Singh, ...
Wireless Communications and Mobile Computing 2022, 1-13, 2022
402022
A collaborative filtering recommendation algorithm based on embedding representation
N Alharbe, MA Rakrouki, A Aljohani
Expert Systems with Applications 215, 119380, 2023
342023
Predictive analytics and machine learning for real-time supply chain risk mitigation and agility
A Aljohani
Sustainability 15 (20), 15088, 2023
322023
Generating synthetic images for healthcare with novel deep pix2pix gan
A Aljohani, N Alharbe
Electronics 11 (21), 3470, 2022
242022
Real-time driver distraction recognition: A hybrid genetic deep network based approach
AA Aljohani
Alexandria Engineering Journal 66, 377-389, 2023
132023
An improved ant colony algorithm for solving a virtual machine placement problem in a cloud computing environment
N Alharbe, MA Rakrouki, A Aljohani
IEEE Access 10, 44869-44880, 2022
132022
A fuzzy grouping genetic algorithm for solving a real-world virtual machine placement problem in a healthcare-cloud
N Alharbe, A Aljohani, MA Rakrouki
Algorithms 15 (4), 128, 2022
112022
A comparison of distance metrics in semi-supervised hierarchical clustering methods
A Aljohani, DTC Lai, PC Bell, EA Edirisinghe
Intelligent Computing Methodologies: 13th International Conference, ICIC …, 2017
52017
Atom search optimization with the deep transfer learning-driven esophageal Cancer classification model
NR Alharbe, RM Munshi, MM Khayyat, MM Khayyat, SH Abdalaha Hamza, ...
Computational Intelligence and Neuroscience 2022, 2022
42022
A healthcare quality assessment model based on outlier detection algorithm
N Alharbe, MA Rakrouki, A Aljohani
Processes 10 (6), 1199, 2022
42022
An access control model based on system security risk for dynamic sensitive data storage in the cloud
N Alharbe, A Aljohani, MA Rakrouki, M Khayyat
Applied Sciences 13 (5), 3187, 2023
32023
An Effective and Efficient Constrained Ward’s Hierarchical Agglomerative Clustering Method
AA Aljohani, EA Edirisinghe, DTC Lai
Intelligent Systems and Applications: Proceedings of the 2019 Intelligent …, 2020
32020
A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications
Z Wenhua, MK Hasan, NB Jailani, S Islam, N Safie, HM Albarakati, ...
Computers in Human Behavior 153, 108134, 2024
22024
Inverse Document Frequency & KNN Machine Learning Approach based Novel Text Semantic Analysis
AA Aljohani, P Jaroli, R Chitkara
2022 2nd International Conference on Advance Computing and Innovative …, 2022
22022
A New Text Summarization Approach based on Relative Entropy and Document Decomposition
N Alharbe, MA Rakrouki, A Aljohani, M Khayyat
International Journal of Advanced Computer Science and Applications 13 (3), 2022
22022
Minimizing total tardiness in a two-machine flowshop scheduling problem with availability constraints
M Rakrouki, A Aljohani, N Alharbe, A Berrais, T Ladhari
Intell. Autom. Soft Comput 35, 1119-1134, 2022
22022
Boosting Ensemble Learning for Freeway Crash Classification under Varying Traffic Conditions: A Hyperparameter Optimization Approach
A Almahdi, RE Al Mamlook, N Bandara, AS Almuflih, A Nasayreh, ...
Sustainability 15 (22), 15896, 2023
12023
TG-SMR: AText Summarization Algorithm Based on Topic and Graph Models.
MA Rakrouki, N Alharbe, M Khayyat, A Aljohani
Computer Systems Science & Engineering 45 (1), 2023
12023
Selection of an Efficient Classification Algorithm for Ambient Assisted Living: Supportive Care for Elderly People
R Alluhaibi, N Alharbe, A Aljohani, RE Al Mamlook
Healthcare 11 (2), 256, 2023
12023
Machine Learning Techniques for COVID-19 Detection: A Comparative Analysis
A Aljohani
International Journal of Computer and Information Engineering 16 (12), 592-597, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20