default search action
Mohammed Awad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Sadi Alawadi, Khalid Alkharabsheh, Fahed Alkhabbas, Victor R. Kebande, Feras M. Awaysheh, Fabio Palomba, Mohammed Awad:
FedCSD: A Federated Learning Based Approach for Code-Smell Detection. IEEE Access 12: 44888-44904 (2024) - [j22]Aktham Sawan, Mohammed Awad, Radwan Qasrawi, Mohammad Sowan:
Hybrid deep learning and metaheuristic model based stroke diagnosis system using electroencephalogram (EEG). Biomed. Signal Process. Control. 87(Part A): 105454 (2024) - [j21]Thaer Thaher, Alaa F. Sheta, Mohammed Awad, Mohammed Aldasht:
Enhanced variants of crow search algorithm boosted with cooperative based island model for global optimization. Expert Syst. Appl. 238(Part A): 121712 (2024) - [j20]Mohammad A. Z. Abu Zuhri, Mohammed Awad, Shahnaz Najjar, Nuha El Sharif, Issa Ghrouz:
Colorectal cancer risk factor assessment in Palestine using machine learning models. Int. J. Medical Eng. Informatics 16(2): 126-138 (2024) - 2023
- [j19]Salam Fraihat, Sharif Naser Makhadmeh, Mohammed Awad, Mohammed Azmi Al-Betar, Aneesa Al Redhaei:
Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm. Internet Things 22: 100819 (2023) - [j18]Mohammed Awad, Salam Fraihat:
Recursive Feature Elimination with Cross-Validation with Decision Tree: Feature Selection Method for Machine Learning-Based Intrusion Detection Systems. J. Sens. Actuator Networks 12(5): 67 (2023) - [c17]Aktham Sawan, Mohammed Awad:
Assessing the Stress-Reducing Effects of Quranic Listening: An EEG-Based Classification Study. ACIT 2023: 1-9 - [c16]Sarah Elfattal, Mohammed Awad, Shadi Ben Abderrahmen:
E-voting in Literature: Analyzing Nations' Interest. CEEeGov 2023: 41-46 - [c15]Aktham Sawan, Mohammed Awad, Radwan Qasrawi:
Classification of Stroke Using Machine Learning Techniques: Review Study. ICCAD 2023: 1-8 - 2022
- [j17]Sahar Idwan, Shereen Ismail, Moh'd Sami Ashhab, Mohammed Awad, Izzeddin Matar:
Artificial neural network tactic to predict interest in majors in computing. Int. J. Comput. Aided Eng. Technol. 17(3): 335-347 (2022) - [j16]Mohammed Dwaikat, Mohammed Awad:
Hybrid Model for Coronary Artery Disease Classification Based on Neural Networks and Evolutionary Algorithms. J. Inf. Sci. Eng. 38(5): 1001-1020 (2022) - [j15]Thaer Thaher, Mohammed Awad, Mohammed Aldasht, Alaa F. Sheta, Hamza Turabieh, Hamouda Chantar:
An Enhanced Evolutionary Based Feature Selection Approach Using Grey Wolf Optimizer for the Classification of High-dimensional Biological Data. J. Univers. Comput. Sci. 28(5): 499-539 (2022) - [j14]Yaman Albadawi, Maen Takruri, Mohammed Awad:
A Review of Recent Developments in Driver Drowsiness Detection Systems. Sensors 22(5): 2069 (2022) - [j13]Mohammed Awad, Salam Fraihat, Khouloud Salameh, Aneesa Al Redhaei:
Examining the Suitability of NetFlow Features in Detecting IoT Network Intrusions. Sensors 22(16): 6164 (2022) - [c14]Aktham Sawan, Mohammed Awad, Radwan Qasrawi:
Machine Learning-based Approach for Stroke Classification using Electroencephalogram (EEG) Signals. BIODEVICES 2022: 111-117 - [c13]Mohammed Awad, Aneesa Al Redhaei, Salam Fraihat:
Using Business Intelligence to Analyze Road Traffic Accidents. CEEeGov 2022: 83-92 - [c12]Mohammed Awad, Khouloud Salameh, Assamahou Malika Ngoungoure, Maryam Abdullah:
Opinion Spamming: Analyzing the Accuracy of Online Detection Tools. CEEeGov 2022: 142-146 - 2021
- [j12]Aisha K. El Allam, Abdul-Halim M. Jallad, Mohammed Awad, Maen Takruri, Prashanth Reddy Marpu:
A Highly Modular Software Framework for Reducing Software Development Time of Nanosatellites. IEEE Access 9: 107791-107803 (2021)
2010 – 2019
- 2019
- [c11]Mohammed Awad, Khouloud Salameh, Ernst L. Leiss:
Evaluating Learning Management System Usage at a Small University. ICISDM 2019: 98-102 - 2018
- [j11]Alaeddin Alabdallah, Mohammed Awad:
Using weighted Support Vector Machine to address the imbalanced classes problem of Intrusion Detection System. KSII Trans. Internet Inf. Syst. 12(10): 5143-5158 (2018) - [j10]Jose Daniel Velazco Garcia, Mohammed Awad, Ernst L. Leiss:
Randomization of Statistical Queries of Type Median: A Simulation Approach. J. Comput. Sci. 14(1): 67-80 (2018) - [j9]Mohammed Awad, Ibrahim Qasrawi:
Enhanced RBF neural network model for time series prediction of solar cells panel depending on climate conditions (temperature and irradiance). Neural Comput. Appl. 30(6): 1757-1768 (2018) - [c10]Shereen Ismail, Amal Ahmad, Mohammed Awad, Mohammad Abdul Jawad:
Evaluating Cache Power Dissipation Across Different Process Technologies. AICCSA 2018: 1-5 - [c9]Mohammed Awad, Ernst L. Leiss:
Did Technology Fail Us?: Security Concerns in Safeguarding Democracy. ICEGOV 2018: 626-630 - 2017
- [j8]Mohammed Awad:
Enhanced hybrid method of divide-and-conquer and RBF neural networks for function approximation of complex problems. Turkish J. Electr. Eng. Comput. Sci. 25: 1095-1105 (2017) - [j7]Mohammed Awad:
Forecasting of chaotic time series using RBF neural networks optimized by genetic algorithms. Int. Arab J. Inf. Technol. 14(6): 826-834 (2017) - [j6]Monir Foqaha, Mohammed Awad:
Hybrid Approach to Optimize the Centers of Radial Basis Function Neural Network Using Particle Swarm Optimization. J. Comput. 12(5): 396-407 (2017) - 2013
- [c8]Mohammed Awad, Ernst L. Leiss:
End-to-End cryptographic voting: Potentials and limitations. ICITST 2013: 113-118 - 2012
- [j5]Mohammed Awad:
Approximating i/o data using wavelet neural networks: control the position of mother wavelet. Int. Arab J. Inf. Technol. 9(1): 22-29 (2012) - [j4]Héctor Pomares, Ignacio Rojas, Mohammed Awad, Olga Valenzuela:
An enhanced clustering function approximation technique for a radial basis function neural network. Math. Comput. Model. 55(3-4): 286-302 (2012) - 2010
- [j3]Mohammed Awad:
Input Variable Selection Using Parallel Processing of RBF Neural Networks. Int. Arab J. Inf. Technol. 7(1): 6-13 (2010)
2000 – 2009
- 2009
- [j2]Mohammed Awad, Héctor Pomares, Ignacio Rojas Ruiz, Osama Salameh, Mai Hamdon:
Prediction of Time Series Using RBF Neural Networks: A New Approach of Clustering. Int. Arab J. Inf. Technol. 6(2): 138-143 (2009) - 2007
- [j1]Luis Javier Herrera, Héctor Pomares, Ignacio Rojas, Alberto Guillén, Jesús González, Mohammed Awad, Ana Herrera:
Multigrid-based fuzzy systems for time series prediction: CATS competition. Neurocomputing 70(13-15): 2410-2425 (2007) - 2005
- [c7]Luis Javier Herrera, Héctor Pomares, Ignacio Rojas, Alberto Guillén, Mohammed Awad, Olga Valenzuela:
Analysis of the TaSe-II TSK-Type Fuzzy System for Function Approximation. ECSQARU 2005: 613-624 - [c6]Mohammed Awad, Héctor Pomares, Ignacio Rojas, Luis Javier Herrera, Alberto Prieto:
Input Variable Selection in Hierarchical RBF Networks. IWANN 2005: 280-288 - [c5]Mohammed Awad, Héctor Pomares, Luis Javier Herrera, Jesús González, Alberto Guillén, Fernando Rojas:
Approximating I/O Data Using Radial Basis Functions: A New Clustering-Based Approach. IWANN 2005: 289-296 - [c4]Luis Javier Herrera, Héctor Pomares, Ignacio Rojas, Alberto Guillén, Jesús González, Mohammed Awad:
Clustering-Based TSK Neuro-fuzzy Model for Function Approximation with Interpretable Sub-models. IWANN 2005: 399-406 - [c3]Luis Javier Herrera, Héctor Pomares, Ignacio Rojas, Alberto Guillén, Mohammed Awad, Jesús González:
Interpretable Rule Extraction and Function Approximation from Numerical Input/Output Data Using the Modified Fuzzy TSK Model, TaSe Model. RSFDGrC (1) 2005: 402-411 - 2004
- [c2]Luis Javier Herrera, Ignacio Rojas Ruiz, Héctor Pomares, Olga Valenzuela, Jesús González, Mohammed Awad:
MultiGrid-Based Fuzzy Systems for Time Series: Forecasting: Overcoming the curse of dimensionality. ESANN 2004: 127-132 - [c1]Luis Javier Herrera, Héctor Pomares, Ignacio Rojas, Olga Valenzuela, Mohammed Awad:
MultiGrid-Based Fuzzy Systems for Function Approximation. MICAI 2004: 252-261
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint