References
- Yousif, J., & Al-Risi, M. (2019). Part of Speech Tagger for Arabic Text Based Support Vector Machines: A Review. ICTACT Journal on Soft Computing.
- Habib, Sandy. “The Exponents of Eleven Simple, Universal Concepts in Three Semitic Languages.” International Journal of Arabic Linguistics 6, no. 1-2 (2020): 68-90.
- Ameur, Mohamed Seghir Hadj, Farid Meziane, and Ahmed Guessoum. “Arabic Machine Translation: A survey of the latest trends and challenges.” Computer Science Review 38 (2020): 100305. doi: https://doi.org/10.1016/j.cosrev.2020.100305
- Saad, Hasbollah Bin Mat. The Principles Of Shari’ah: Texts And Materials. Pena Hijrah Resources, 2020.
- Wright, Thomas. The Life of Sir Richard Burton. BoD–Books on Demand, 2020.
- Wan, Shaohua, Zonghua Gu, and Qiang Ni. “Cognitive computing and wireless communications on the edge for healthcare service robots.” Computer Communications 149 (2020): 99-106. doi: https://doi.org/10.1016/j.comcom.2019.10.012
- Alomari, M., and M. Jabr. “The effect of the use of an educational software based on the strategy of artificial intelligence on students’ achievement and their attitudes towards it.” Management Science Letters 10, no. 13 (2020): 2951-2960. doi: https://doi.org/10.5267/j.msl.2020.5.030
- Meshrif Alruily and Osama R. Shahin “Sentiment Analysis of Twitter Data for Saudi Universities.” International Journal of Machine Learning and Computing (IJMLC) 10 (2020): 18-24. doi: https://doi.org/10.18178/ijmlc.2020.10.1.892
- Winkler, David A. “Role of Artificial Intelligence and Machine Learning in Nanosafety.” Small 16, no. 36 (2020): 2001883. doi: https://doi.org/10.1002/smll.202001883
- Li, Yan, Manoj A. Thomas, and Dapeng Liu. “From semantics to pragmatics: where IS can lead in Natural Language Processing (NLP) research.” European Journal of Information Systems (2020): 1-22.
- Zhao, Zhitao, Yang Lou, Yifeng Chen, Hongjun Lin, Renjie Li, and Genying Yu. “Prediction of interfacial interactions related with membrane fouling in a membrane bioreactor based on radial basis function artificial neural network (ANN).” Bioresource technology 282 (2019): 262-268. doi: https://doi.org/10.1016/j.biortech.2019.03.044
- Kansa, E. J., and P. Holoborodko. “Fully and sparsely supported radial basis functions.” International Journal of Computational Methods and Experimental Measurements 8, no. 3 (2020): 208-219. doi: https://doi.org/10.2495/CMEM-V8-N3-208-219
- Alhasan, A., & Al-Taani, A. T. (2018). POS tagging for arabic text using bee colony algorithm. Procedia computer science, 142, 158-165. doi: https://doi.org/10.1016/j.procs.2018.10.471
- Elnagar, A., Einea, O., & Al-Debsi, R. (2019). Automatic text tagging of Arabic news articles using ensemble deep learning models. In Proceedings of the 3rd International Conference on Natural Language and Speech Processing (pp. 59-66).
- Alharbi, F. R., & Khan, M. B. (2019). Identifying comparative opinions in Arabic text in social media using machine learning techniques. SN Applied Sciences, 1(3), 213. doi: https://doi.org/10.1007/s42452-019-0183-3
- Salloum, S. A., AlHamad, A. Q., Al-Emran, M., & Shaalan, K. (2018). A survey of Arabic text mining. In Intelligent Natural Language Processing: Trends and Applications (pp. 417-431). Springer, Cham.
- Cherroun, H., & Alshehri, A. (2018, April). Disguised plagiarism detection in Arabic text documents. In 2018 2nd International Conference on Natural Language and Speech Processing (ICNLSP) (pp. 1-6). IEEE.
- Yousif, J. (2019). Hidden Markov Model Tagger for Applications Based Arabic Text: A review. Journal of Computation and Applied Sciences IJOCAAS, 7(1).
- Zakraoui, J., Elloumi, S., Alja’am, J. M., & Yahia, S. B. (2019). “Improving Arabic text to image mapping using a robust machine learning technique.” IEEE Access, 7, 18772-18782. doi: https://doi.org/10.1109/ACCESS.2019.2896713
- Pankaj Dadheech, Ankit Kumar, Chothmal Choudhary, Mahender Kumar Beniwal, Sanwta Ram Dogiwal & Basant Agarwal (2019), “An Enhanced 4-Way Technique Using Cookies for Robust Authentication Process in Wireless Network”, Journal of Statistics and Management Systems, 22:4, 773-782, DOI: https://doi.org/10.1080/09720510.2019.1609557.
- Ankit Kumar, Pankaj Dadheech, Vijander Singh, Linesh Raja & Ramesh C. Poonia (2019), “An Enhanced Quantum Key Distribution Protocol for Security Authentication”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 499-507, DOI: https://doi.org/10.1080/09720529.2019.1637154.
- Ankit Kumar, Pankaj Dadheech, Vijander Singh, Ramesh C. Poonia & Linesh Raja (2019), “An Improved Quantum Key Distribution Protocol for Verification”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 491-498, DOI: https://doi.org/10.1080/09720529.2019.1637153.
- Ankit Kumar and Madhavi Sinha (2019), “Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET)”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 453-463, DOI: https://doi.org/10.1080/09720529.2019.1637151.
- Ankit Kumar & Madhavi Sinha (2019) Design and development of new framework for detection and mitigation of wormhole and black hole attacks in VANET, Journal of Statistics and Management Systems, 22:4, 753-761, DOI: https://doi.org/10.1080/09720510.2019.1609555
- Ankit Kumar, Pankaj Dadheech, Rajani Kumari & Vijander Singh (2019) Anenhanced energy efficient routing protocol for VANET using special cross over in genetic algorithm, Journal of Statistics and Management Systems, 22:7, 1349-1364, DOI: https://doi.org/10.1080/09720510.2019.1618519