Khaled Hatem Almotairi

Orcid: 0000-0002-5961-183X

Affiliations:
  • Umm Al-Qura University, Computer Engineering Department, Computer and Information Systems College, Makkah, Saudi Arabia


According to our database1, Khaled Hatem Almotairi authored at least 26 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
STC: Spatial and Temporal Clustering for Cooperative Perception System.
IEEE Trans. Veh. Technol., August, 2024

A Novel NLP-Driven Dashboard for Interactive CyberAttacks Tweet Classification and Visualization.
Inf., March, 2024

CybAttT: A Dataset of Cyberattack News Tweets for Enhanced Threat Intelligence.
Data, March, 2024

2023
MiRNA subset selection for microarray data classification using grey wolf optimizer and evolutionary population dynamics.
Neural Comput. Appl., September, 2023

Multilevel thresholding image segmentation using meta-heuristic optimization algorithms: comparative analysis, open challenges and new trends.
Appl. Intell., May, 2023

CCPAV: Centralized cooperative perception for autonomous vehicles using CV2X.
Ad Hoc Networks, April, 2023

Impact of Artificial Intelligence on COVID-19 Pandemic: A Survey of Image Processing, Tracking of Disease, Prediction of Outcomes, and Computational Medicine.
Big Data Cogn. Comput., March, 2023

2022
Hybrid Reptile Search Algorithm and Remora Optimization Algorithm for Optimization Tasks and Data Clustering.
Symmetry, 2022

A Normal Distributed Dwarf Mongoose Optimization Algorithm for Global Optimization and Data Clustering Applications.
Symmetry, 2022

Improved reptile search algorithm with novel mean transition mechanism for constrained industrial engineering problems.
Neural Comput. Appl., 2022

Dynamic evolutionary data and text document clustering approach using improved Aquila optimizer based arithmetic optimization algorithm and differential evolution.
Neural Comput. Appl., 2022

Efficient text document clustering approach using multi-search Arithmetic Optimization Algorithm.
Knowl. Based Syst., 2022

Hybrid adaptive method for lane detection of degraded road surface condition.
J. King Saud Univ. Comput. Inf. Sci., 2022

Comparative analysis of some selected generative adversarial network models for image augmentation: a case study of COVID-19 x-ray and CT images.
J. Intell. Fuzzy Syst., 2022

2021
A Novel Classification of Machine Learning Applications in Healthcare.
Proceedings of the 3rd IEEE Middle East and North Africa COMMunications Conference, 2021

Privacy-Preserving Biometric-based Authentication Scheme for Electric Vehicles Charging System.
Proceedings of the 3rd IEEE Middle East and North Africa COMMunications Conference, 2021

2020
FloDusTA: Saudi Tweets Dataset for Flood, Dust Storm, and Traffic Accident Events.
Proceedings of The 12th Language Resources and Evaluation Conference, 2020

2015
A Distributed Multi-Channel MAC Protocol for Ad Hoc Wireless Networks.
IEEE Trans. Mob. Comput., 2015

2014
Distributed power control over multiple channels for ad hoc wireless networks.
Wirel. Commun. Mob. Comput., 2014

2013
Multichannel medium access control for ad hoc wireless networks.
Wirel. Commun. Mob. Comput., 2013

Inverse Binary Exponential Backoff: Enhancing Short-term Fairness for IEEE 802.11 Networks.
Proceedings of the ISWCS 2013, 2013

2012
Distributed Power Control and Medium Access Control Protocol Design for Multi-Channel Ad Hoc Wireless Networks.
PhD thesis, 2012

2011
Fast and Slow Hopping MAC Protocol for Single-Hop Ad Hoc Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2011

2010
MMAC-HR: Multi-Channel Medium Access Control with Hopping Reservation for Multi-Hop Wireless Networks.
Proceedings of the Global Communications Conference, 2010

Symmetrical Power Control for Multi-Channel Multi-Hop Wireless Networks.
Proceedings of the Global Communications Conference, 2010

2008
Credit-Based User Authentication for Delay Tolerant Mobile Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2008


  Loading...