Alert button
Picture for Shahab Shamshirband

Shahab Shamshirband

Alert button

A Mobile Cloud-Based eHealth Scheme

Add code
Bookmark button
Alert button
Apr 15, 2020
Yihe Liu, Aaqif Afzaal Abbasi, Atefeh Aghaei, Almas Abbasi, Amir Mosavi, Shahab Shamshirband, Mohammed A. A. Al-qaness

Figure 1 for A Mobile Cloud-Based eHealth Scheme
Figure 2 for A Mobile Cloud-Based eHealth Scheme
Figure 3 for A Mobile Cloud-Based eHealth Scheme
Viaarxiv icon

Resource-Aware Network Topology Management Framework

Add code
Bookmark button
Alert button
Feb 26, 2020
Aaqif Afzaal Abbasi, Shahab Shamshirband, Mohammed A. A. Al-qaness, Almas Abbasi, Nashat T. AL-Jallad, Amir Mosavi

Figure 1 for Resource-Aware Network Topology Management Framework
Figure 2 for Resource-Aware Network Topology Management Framework
Figure 3 for Resource-Aware Network Topology Management Framework
Figure 4 for Resource-Aware Network Topology Management Framework
Viaarxiv icon

Application of ERA5 and MENA simulations to predict offshore wind energy potential

Add code
Bookmark button
Alert button
Feb 24, 2020
Shahab Shamshirband, Amir Mosavi, Narjes Nabipour, Kwok-wing Chau

Figure 1 for Application of ERA5 and MENA simulations to predict offshore wind energy potential
Figure 2 for Application of ERA5 and MENA simulations to predict offshore wind energy potential
Figure 3 for Application of ERA5 and MENA simulations to predict offshore wind energy potential
Figure 4 for Application of ERA5 and MENA simulations to predict offshore wind energy potential
Viaarxiv icon

Prediction of flow characteristics in the bubble column reactor by the artificial pheromone-based communication of biological ants

Add code
Bookmark button
Alert button
Jan 09, 2020
Shahab Shamshirband, Meisam Babanezhad, Amir Mosavi, Narjes Nabipour, Eva Hajnal, Laszlo Nadai, Kwok-Wing Chau

Figure 1 for Prediction of flow characteristics in the bubble column reactor by the artificial pheromone-based communication of biological ants
Figure 2 for Prediction of flow characteristics in the bubble column reactor by the artificial pheromone-based communication of biological ants
Figure 3 for Prediction of flow characteristics in the bubble column reactor by the artificial pheromone-based communication of biological ants
Figure 4 for Prediction of flow characteristics in the bubble column reactor by the artificial pheromone-based communication of biological ants
Viaarxiv icon

Modeling Climate Change Impact on Wind Power Resources Using Adaptive Neuro-Fuzzy Inference System

Add code
Bookmark button
Alert button
Jan 09, 2020
Narjes Nabipour, Amir Mosavi, Eva Hajnal, Laszlo Nadai, Shahab Shamshirband, Kwok-Wing Chau

Figure 1 for Modeling Climate Change Impact on Wind Power Resources Using Adaptive Neuro-Fuzzy Inference System
Figure 2 for Modeling Climate Change Impact on Wind Power Resources Using Adaptive Neuro-Fuzzy Inference System
Figure 3 for Modeling Climate Change Impact on Wind Power Resources Using Adaptive Neuro-Fuzzy Inference System
Figure 4 for Modeling Climate Change Impact on Wind Power Resources Using Adaptive Neuro-Fuzzy Inference System
Viaarxiv icon

Modeling Daily Pan Evaporation in Humid Climates Using Gaussian Process Regression

Add code
Bookmark button
Alert button
Aug 01, 2019
Sevda Shabani, Saeed Samadianfard, Mohammad Taghi Sattari, Shahab Shamshirband, Amir Mosavi, Tibor Kmet, Annamaria R. Varkonyi-Koczy

Figure 1 for Modeling Daily Pan Evaporation in Humid Climates Using Gaussian Process Regression
Figure 2 for Modeling Daily Pan Evaporation in Humid Climates Using Gaussian Process Regression
Figure 3 for Modeling Daily Pan Evaporation in Humid Climates Using Gaussian Process Regression
Figure 4 for Modeling Daily Pan Evaporation in Humid Climates Using Gaussian Process Regression
Viaarxiv icon

A New Malware Detection System Using a High Performance-ELM method

Add code
Bookmark button
Alert button
Jun 27, 2019
Shahab Shamshirband, Anthony T. Chronopoulos

Figure 1 for A New Malware Detection System Using a High Performance-ELM method
Figure 2 for A New Malware Detection System Using a High Performance-ELM method
Figure 3 for A New Malware Detection System Using a High Performance-ELM method
Figure 4 for A New Malware Detection System Using a High Performance-ELM method
Viaarxiv icon