Karim Ouazzane
#180,693
Most Influential Person Now
British computer scientist
Karim Ouazzane's AcademicInfluence.com Rankings
Karim Ouazzanecomputer-science Degrees
Computer Science
#11978
World Rank
#12753
Historical Rank
Artificial Intelligence
#6274
World Rank
#6382
Historical Rank
Database
#10424
World Rank
#11087
Historical Rank
Download Badge
Computer Science
Karim Ouazzane's Degrees
- PhD Computer Science University of Oxford
Similar Degrees You Can Earn
Why Is Karim Ouazzane Influential?
(Suggest an Edit or Addition)According to Wikipedia, Professor Karim Ouazzane is a computer scientist and Professor of Computing and Knowledge Exchange in the School of Computing within the Faculty of Life Sciences and Computing at London Metropolitan University in London.
Karim Ouazzane's Published Works
Published Works
- Neuro-Fuzzy approach to video transmission over ZigBee (2013) (16)
- SOTER: A Playbook for Cybersecurity Incident Management (2020) (14)
- Neural Network Approaches for Noisy Language Modeling (2013) (10)
- An Innovative Custom Cyber Security Solution for Protecting Enterprises and Corporates' Assets (2013) (9)
- Intelligence Graphs for Threat Intelligence and Security Policy Validation of Cyber Systems (2020) (9)
- Adaptive business rules framework for workflow management (2018) (8)
- A neural network based solution for automatic typing errors correction (2011) (8)
- Meshless Method for Analysis of Permeable Breakwaters in the Proximity of A Vertical Wall (2019) (8)
- ONTOCARER: AN ONTOLOGICAL FRAMEWORK FOR ASSISTIVE AGENTS FOR THE DISABLED (2013) (7)
- Using SeaWiFS Measurements to Evaluate Radiometric Stability of Pseudo-Invariant Calibration Sites at Top of Atmosphere (2015) (7)
- Cyber Onboarding is ‘Broken’ (2019) (7)
- An experimental investigation and design of flow-conditioning devices for orifice metering (2007) (7)
- Simulation-based visual analysis of individual and group dynamic behavior (2016) (6)
- Audio-visual fuzzy fusion for robust speech recognition (2013) (6)
- Challenges towards Building an effective Cyber Security Operations Centre (2019) (5)
- Quasi‐elliptic dual‐band planar BPF with high‐selectivity and high inter‐band isolation for 5G communications systems (2019) (4)
- GDPR: Is your consent valid? (2020) (4)
- Wideband microstrip quasi‐elliptic function bandpass filter with high out‐of‐band rejection (2019) (4)
- REMOTE BANKING FRAUD DETECTION FRAMEWORK USING SEQUENCE LEARNERS (2019) (4)
- Incremental Reconstruction of Moving Object Trajectory (2017) (4)
- Evolutionary Ranking on Multiple Word Correction Algorithms Using Neural Network Approach (2009) (3)
- Hybrid HMM/DTW based Speech Recognition with Kernel Adaptive Filtering Method (2014) (3)
- Keystroke Dynamics using Auto Encoders (2019) (2)
- Performance optimization in video transmission over ZigBee using Particle Swarm Optimization (2016) (2)
- Securing Voice Communications Using Audio Steganography (2022) (2)
- Hard and soft computing methods for capturing and processing phonocardiogram (2)
- Your Password Is Music To My Ears: Cloud Based Authentication Using Sound (2021) (2)
- An Intelligent Keyboard Framework for Improving Disabled People Computer Accessibility (2011) (2)
- K-Nearest Neighbours Based Classifiers for Moving Object Trajectories Reconstruction (2018) (2)
- Adaptive scalable rate control over IEEE 802.15.4 using particle swarm optimization (2013) (2)
- Generic Data Warehousing for Consumer Electronics Retail Industry (2017) (1)
- Binary Image Coding Algorithm Using Tactile Data Information (2003) (1)
- An Integrated Machine Learning Framework for Fraud Detection: A Comparative and Comprehensive Approach (2022) (1)
- An Artificial Intelligence-based language modeling framework (2012) (1)
- A New Framework of Feature Engineering for Machine Learning in Financial Fraud Detection (2020) (1)
- OSCONVR: An Interactive Virtual Reality Interface to an Object-Oriented Database System for Construction Architectural Design (2002) (1)
- Natural Language Processing approach to NLP Meta model automation (2018) (1)
- A Conceptual Model for Surveillance Video Content and Event-Based Indexing and Retrieval (2002) (1)
- Enhancing Cyber Security Using Audio Techniques: A Public Key Infrastructure for Sound (2020) (1)
- A Case-Based Expert System for Estimating the Cost of Refurbishing Construction Buildings (2002) (1)
- Comparison of fixed and variable weight approaches for viseme classification (2007) (1)
- Defence in-depth for Cyber Security With Custom Anti-Virus Signature Definition (2013) (0)
- Using SeaWiFS Measurements to evaluate Long-term Radiometric Stability of Pseudo-invariant Calibration Sites (2014) (0)
- Two-level Architecture for Rule-based Business Process Management (2018) (0)
- Unit of Assessment: Computer Science and Informatics Title of case study: Productivity Gains in the Consumer Electronics Retail Industry through KTP (2021) (0)
- Parallel Querying of Distributed Ontologies with Shared Vocabulary (2019) (0)
- New Feature Engineering Framework for Deep Learning in Financial Fraud Detection (2021) (0)
- The Use of Neural Network and Database Technology to Reengineer the Technical Process of Monitoring Coal Combustion Efficiency (2003) (0)
- A New System Based on the Use of Neural Networks and Database for Monitoring Coal Combustion Efficiency (2003) (0)
- System automation for measuring coal combustion efficiency (2006) (0)
- An e-Business Framework Design using Enhanced Web 2.0 Technology (2011) (0)
- 3D Simulation-based Analysis of Individual and Group Dynamic Behaviour in Video Surveillance (2018) (0)
- Multidimensional Cybersecurity Framework for Strategic Foresight (2022) (0)
- Real-Time Cyber Analytics Data Collection Framework (2022) (0)
- REAL LIFE PILOT SOLUTION WITH ARTIFICIAL INTELLIGENCE FOR DISABLED COMPUTER USERS (2013) (0)
- Syntactic Parser Notification Generator Visual Scene Model Pattern Language Grammar Event logger Pattern Classifier Video Signal Notification Messages Video Signal Processor Trajectory Model Trajectory Tracker Object Extractor CCTV Camera Shapes and Texture Model Frame Stream Trajectory Stream Event (2016) (0)
- An Integrated Object Database and Description Logic System for Online Content and Event-Based Indexing and Retrieval of a Car Park Surveillance Video (2002) (0)
- A MATURITY CAPABILITY FRAMEWORK FOR SECURITY OPERATION CENTER (2022) (0)
- E-business framework using an enhanced Web 2.0 component model (2015) (0)
- Patterns Identification for Hitting Adjacent Key Errors Correction using Neural Network Models (2011) (0)
- Network Security Analytics on the Cloud: Public vs. Private Case (2023) (0)
- Hard and soft computing methods for capturingand processing phonocardiogram (2013) (0)
- Meshless Method for Analysis of Permeable Breakwaters in the Proximity of A Vertical Wall (2019) (0)
This paper list is powered by the following services:
Other Resources About Karim Ouazzane
What Schools Are Affiliated With Karim Ouazzane?
Karim Ouazzane is affiliated with the following schools: