Get my own profile
Public access
View all6 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Hui LiuBeijing Institute of TechnologyVerified email at bit.edu.cn
Nan NiuUniversity of CincinnatiVerified email at uc.edu
Khadidja Bakhti (PhD)Beijing Institute of Technology, China & Algerian Space Agency, AlgeriaVerified email at cts.asal.dz
Ramadhani Ally DumaAssistant Lecturer - The University of Dodoma (UDOM)Verified email at udom.ac.tz
Abdallah YousifSudan Technological University, Sudan & Beijing Institute of Technology, ChinaVerified email at bit.edu.cn
Qasim UmerDepartment of Information and Computer Science (ICS), King Fahd University of Petroleum & MineralsVerified email at kfupm.edu.sa
Abdulganiyu Abdu YusufBEIJING INSTITUTE OF TECHNOLOGYVerified email at bit.edu.cn
Sulis SandiwarnoUniversitas Mercu BuanaVerified email at mercubuana.ac.id
Wentao WangMember Of Technical Staff, OracleVerified email at oracle.com
Nixon MtonyoleThe University of Dodoma, College of Informatics and Virtual EducationVerified email at udom.ac.tz
Ijaz Ul HaqUniversity of VermontVerified email at uvm.edu
Mohamedi M. mjahidiThe University of DodomaVerified email at udom.ac.tz
Nuru JingiliLULEÅ UNIVERSITY OF TECHNOLOGYVerified email at ltu.se
Salim DiwaniThe University of DodomaVerified email at udom.ac.tz
James ChambuaLecturer - Computer Science and Engineering Department, University of Dar-es-SalaamVerified email at udsm.ac.tz
Dr. Tabu S. KondoSenior Lecturer, Department of Computer Science and Engineering, The University of DodomaVerified email at udom.ac.tz
Noe Elisa (PhD)Lecturer in Artificial Intelligence and Cyber SecurityVerified email at udom.ac.tz