Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Abdulalem Ali"'
Autor:
Tusneem Elhassan, Ahmed Hamza Osman, Mohd Shafry Mohd Rahim, Siti Zaiton Mohd Hashim, Abdulalem Ali, Esmaeil Elhassan, Yusra Elkamali, Mahmoud Aljurf
Publikováno v:
Heliyon, Vol 10, Iss 19, Pp e37745- (2024)
1. Abstract: Acute myeloid leukemia (AML) is a highly aggressive cancer form that affects myeloid cells, leading to the excessive growth of immature white blood cells (WBCs) in both bone marrow and peripheral blood. Timely AML detection is crucial fo
Externí odkaz:
https://doaj.org/article/57a51be9afa9498481b3afe15b315454
Autor:
Arafat Al-dhaqm, Shukor Abd Razak, Siti Hajar Othman, Abdulalem Ali, Fuad A. Ghaleb, Arieff Salleh Rosman, Nurazmallail Marni
Publikováno v:
IEEE Access, Vol 8, Pp 48477-48490 (2020)
Database Forensic Investigation (DBFI) involves the identification, collection, preservation, reconstruction, analysis, and reporting of database incidents. However, it is a heterogeneous, complex, and ambiguous field due to the variety and multidime
Externí odkaz:
https://doaj.org/article/a501f1677c51477ba8896595296cbca3
Autor:
Tusneem A. Elhassan, Mohd Shafry Mohd Rahim, Mohd Hashim Siti Zaiton, Tan Tian Swee, Taqwa Ahmed Alhaj, Abdulalem Ali, Mahmoud Aljurf
Publikováno v:
Diagnostics, Vol 13, Iss 2, p 196 (2023)
Recent advancements in artificial intelligence (AI) have led to numerous medical discoveries. The field of computer vision (CV) for medical diagnosis has received particular attention. Using images of peripheral blood (PB) smears, CV has been utilize
Externí odkaz:
https://doaj.org/article/709db49fa7984b6b9bf4201f643700d5
Autor:
Marwan Qaid Mohammed, Lee Chung Kwek, Shing Chyi Chua, Arafat Al-Dhaqm, Saeid Nahavandi, Taiseer Abdalla Elfadil Eisa, Muhammad Fahmi Miskon, Mohammed Nasser Al-Mhiqani, Abdulalem Ali, Mohammed Abaker, Esmail Ali Alandoli
Publikováno v:
Sensors, Vol 22, Iss 20, p 7938 (2022)
Robotic manipulation refers to how robots intelligently interact with the objects in their surroundings, such as grasping and carrying an object from one place to another. Dexterous manipulating skills enable robots to assist humans in accomplishing
Externí odkaz:
https://doaj.org/article/221f6aabea944c398ef807740e350a68
Autor:
Abdulalem Ali, Shukor Abd Razak, Siti Hajar Othman, Taiseer Abdalla Elfadil Eisa, Arafat Al-Dhaqm, Maged Nasser, Tusneem Elhassan, Hashim Elshafie, Abdu Saif
Publikováno v:
Applied Sciences, Vol 12, Iss 19, p 9637 (2022)
Financial fraud, considered as deceptive tactics for gaining financial benefits, has recently become a widespread menace in companies and organizations. Conventional techniques such as manual verifications and inspections are imprecise, costly, and t
Externí odkaz:
https://doaj.org/article/78b084d485ae4acb8424e89ac6852bad
Autor:
Arafat Al-Dhaqm, Shukor Razak, Siti Hajar Othman, Kim-Kwang Raymond Choo, William Bradley Glisson, Abdulalem Ali, Mohammad Abrar
Publikováno v:
IEEE Access, Vol 5, Pp 24401-24416 (2017)
Database forensics is a domain that uses database content and metadata to reveal malicious activities on database systems in an Internet of Things environment. Although the concept of database forensics has been around for a while, the investigation
Externí odkaz:
https://doaj.org/article/7255382a7f694d6a82f8b8bbc93e227b
Autor:
Arafat Al-Dhaqm, Shukor Razak, Siti Hajar Othman, Asri Ngadi, Mohammed Nazir Ahmed, Abdulalem Ali Mohammed
Publikováno v:
PLoS ONE, Vol 12, Iss 2, p e0170793 (2017)
Database Forensics (DBF) is a widespread area of knowledge. It has many complex features and is well known amongst database investigators and practitioners. Several models and frameworks have been created specifically to allow knowledge-sharing and e
Externí odkaz:
https://doaj.org/article/66d4f516092d443fa495b8e73f35f97f
Publikováno v:
PLoS ONE, Vol 12, Iss 4, p e0176223 (2017)
With the rapid development of technology, mobile phones have become an essential tool in terms of crime fighting and criminal investigation. However, many mobile forensics investigators face difficulties with the investigation process in their domain
Externí odkaz:
https://doaj.org/article/65f49c54898c406f85b864415634a980
Publikováno v:
Kids Cybersecurity Using Computational Intelligence Techniques ISBN: 9783031211980
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::de9736511ca25a4a16b2b45d0782633c
https://doi.org/10.1007/978-3-031-21199-7_5
https://doi.org/10.1007/978-3-031-21199-7_5
Publikováno v:
Kids Cybersecurity Using Computational Intelligence Techniques ISBN: 9783031211980
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5d9e400603070d297d688954e8048a89
https://doi.org/10.1007/978-3-031-21199-7_6
https://doi.org/10.1007/978-3-031-21199-7_6