Zobrazeno 1 - 10
of 84
pro vyhledávání: '"Abdallah MERAOUMIA"'
Publikováno v:
Acta Informatica Pragensia, Vol 13, Iss 2, Pp 193-212 (2024)
In recent years, as technology has advanced and more and more activities have become digitized, cybersecurity has become a top priority for governments around the world. Cybersecurity is essential for protecting computer systems, networks and data fr
Externí odkaz:
https://doaj.org/article/1ff7e73fc88640ab9552f5dc07b4c5a7
Publikováno v:
Acta Informatica Pragensia, Vol 13, Iss 2, Pp 165-167 (2024)
This editorial summarises the special issue entitled "Future Trends of Machine Intelligence in Science and Industry", which brings together several pieces of research that showcase the transformative impact of deep learning and intelligent systems ac
Externí odkaz:
https://doaj.org/article/3bcbf634c4f14f31b1408a3f09cc6313
Publikováno v:
Applied Computer Science, Vol 20, Iss 1 (2024)
In the field of Electronic Health (e-Health), Electronic Health Records (EHR) are transmitted between health professionals using e-Health systems for cooperative medical practice, medical monitoring, telemedical expertise, and telemedical imaging. Me
Externí odkaz:
https://doaj.org/article/f1364385110744f7a410cffbcec9a2e5
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 8, Pp 5493-5509 (2022)
Internet of Things (IoT) sensing capabilities are now available as a public service. This new model, called sensing as a service (S2aaS), allows data owners to sell and/or exchange data with consumers interested in large open markets. However, the op
Externí odkaz:
https://doaj.org/article/47aada47e1714a468b570a7fc9426c77
Publikováno v:
Journal of King Saud University - Computer and Information Sciences. 34:5493-5509
Internet of Things (IoT) sensing capabilities are now available as a public service. This new model , called sensing as a service (S2aaS) , a llows data owners to sell and/or exchange data with consumers interested in large open markets. However, t h
Publikováno v:
Computer Science. 24
The feature extraction step is a major and crucial step in analyzing and understanding raw data as it has a considerable impact on the system accuracy. Unfortunately, despite the very acceptable results obtained by many handcrafted methods, they can
Publikováno v:
Pattern Recognition and Image Analysis. 32:109-128
Publikováno v:
Demonstratio Mathematica. 55:900-921
Recently, electricity consumption forecasting has attracted much research due to its importance in our daily life as well as in economic activities. This process is seen as one of the ways to manage future electricity needs, including anticipating th
Publikováno v:
Recent Advances in Computer Science and Communications. 14:2087-2102
Background: Remote authentication in current networks such as IoT that connects many end-devices of low capacity must be light, accurate and scalable without threaten security. In general, biometrics is the most reliable way to authenticate users bec
Publikováno v:
2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS).