default search action
Eman Abdelfattah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j3]Eman Abdelfattah, Shreehar Joshi:
Comparison of Machine Learning Classification and Clustering Algorithms for TV Commercials Detection. IEEE Access 11: 116741-116751 (2023) - [c27]Eman Abdelfattah, Kevin Bowlyn:
Application of Machine Learning Models on Individual Household Electric Power Consumption. AIIoT 2023: 143-146 - [c26]Alexander Lektorov, Eman Abdelfattah, Shreehar Joshi:
Airbnb Rental Price Prediction Using Machine Learning Models. CCWC 2023: 339-344 - [c25]Eman Abdelfattah, Yuval Ashkenazi:
Classifying Air Quality Using Machine Learning Models. UEMCON 2023: 459-463 - 2022
- [c24]Sanskar Raj Marahata, Eman Abdelfattah, Sandra Ibrahim, Audrina Dobrevic:
No-Clear for Nuclear. AIIoT 2022: 161-166 - [c23]Shreehar Joshi, Eman Abdelfattah, Ryan Osgood:
Classification of Movie Success: A Comparison of Two Movie Datasets. AIIoT 2022: 654-658 - [c22]Ammar Jamil Odeh, Ismail Mohamed Keshta, Abobakr Aboshgifa, Eman Abdelfattah:
Privacy and Security in Mobile Health Technologies: Challenges and Concerns. CCWC 2022: 65-71 - [c21]Tenzin Sherpa, Eman Abdelfattah, Kristin Miyamoto, Tiffany La Torre:
U.S. Wildfire Risks and Prevention. CCWC 2022: 377-384 - 2021
- [c20]Shreehar Joshi, Eman Abdelfattah:
Multi-Class Text Classification Using Machine Learning Models for Online Drug Reviews. AIIoT 2021: 262-267 - [c19]Biplab Thapa Magar, Subin Mali, Eman Abdelfattah:
App Success Classification Using Machine Learning Models. CCWC 2021: 642-647 - [c18]Shreeja Dahal, Robert Schaeffer, Eman Abdelfattah:
Performance of Different Classification Models on National Coral Reef Monitoring Dataset. CCWC 2021: 662-666 - [c17]Arifur Rahman, Michael Whitlock, Eman Abdelfattah:
Effectiveness of Classifiers to Identify Hand Gestures with Motion Capture Coordinate Markers. CCWC 2021: 779-784 - [c16]Ammar Jamil Odeh, Ismail Mohamed Keshta, Eman Abdelfattah:
Machine LearningTechniquesfor Detection of Website Phishing: A Review for Promises and Challenges. CCWC 2021: 813-818 - [c15]Shreehar Joshi, Eman Abdelfattah, Shreekar Tiwari:
Analyzing Police Shootings in the US. UEMCON 2021: 92-96 - 2020
- [j2]Ammar Jamil Odeh, Ismail Mohamed Keshta, Eman Abdelfattah:
Efficient Detection of Phishing Websites Using Multilayer Perceptron. Int. J. Interact. Mob. Technol. 14(11): 22-31 (2020) - [c14]Justina Celentano, Eman Abdelfattah:
Analyzing Gun Violence in the United States. UEMCON 2020: 258-261 - [c13]Yash Parikh, Eman Abdelfattah:
Clustering Algorithms and RFM Analysis Performed on Retail Transactions. UEMCON 2020: 506-511 - [c12]Shreehar Joshi, Eman Abdelfattah:
Efficiency of Different Machine Learning Algorithms on the Multivariate Classification of IoT Botnet Attacks. UEMCON 2020: 517-521
2010 – 2019
- 2019
- [c11]Brandan Quinn, Eman Abdelfattah:
Machine Learning Meteorologist Can Predict Rain. UEMCON 2019: 57-62 - [c10]Yash Parikh, Eman Abdelfattah:
Comparison of Machine Learning Models to Predict Twitter Buzz. UEMCON 2019: 69-73 - [c9]Vanesa Getseva, Salil Maharjan, Eman Abdelfattah:
Performance of Classification Models on Various Types of Character Data. UEMCON 2019: 94-98 - [c8]Yash Parikh, Eman Abdelfattah:
Machine Learning Models to Predict Multiclass Protein Classifications. UEMCON 2019: 300-304 - 2018
- [c7]Kevin Wunderlich, Eman Abdelfattah:
Human Activity and Posture Classification Using Wearable Accelerometer Data. UEMCON 2018: 77-81 - [c6]Peter Johnson, Eman Abdelfattah:
Applying Machine Learning Models to Identify Forest Cover. UEMCON 2018: 471-474 - [c5]Fekadu Yihunie, Eman Abdelfattah:
Simulation and Analysis of Quality of Service (QoS) of Voice over IP (VoIP) through Local Area Networks. UEMCON 2018: 598-602 - 2017
- [j1]Ramadhan J. Mstafa, Khaled M. Elleithy, Eman Abdelfattah:
A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC. IEEE Access 5: 5354-5365 (2017) - [c4]Ammar Jamil Odeh, Eman Abdelfattah:
A new tree target tracking algorithm in WSNs. UEMCON 2017: 122-126 - [c3]Gaurav Kumar, Eman Abdelfattah, Johnathon Holbrooks, Alexander Pérez:
Analyzing the effect of DoS attacks on network performance. UEMCON 2017: 372-376 - 2013
- [i2]Fatma Almajadub, Eman Abdelfattah, Abdul Razaque:
Deployment of Stream Control Transmission Protocol (SCTP) to Maintain the Applications of Data Centers. CoRR abs/1311.2630 (2013) - [i1]Fatma Almajadub, Abdul Razaque, Eman Abdelfattah:
Stream Control Transmission Protocol (SCTP): Robust and Efficient for Data Centre Applications. CoRR abs/1312.0629 (2013)
2000 – 2009
- 2009
- [c2]Sumaya Abusaleh, Eman Abdelfattah, Zain Alabadi, Ahmad Sharieh:
The Effects of Educational Multimedia for Scientific Signs in the Holy Quran in Improving the Creative Thinking Skills for Deaf Children. SCSS 2009: 403-408 - 2008
- [c1]Eman Abdelfattah:
Performance Evaluation of TCP Congestion Control Mechanisms. TeNe 2008: 251-256
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint