Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Abdullah Alenizi"'
Autor:
Ahmad Raza Khan, Shaik Shakeel Ahamad, Shailendra Mishra, Mohd Abdul Rahim Khan, Sunil Kumar Sharma, Abdullah AlEnizi, Osama Alfarraj, Majed Alowaidi, Manoj Kumar
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-24 (2024)
Abstract With the swift advancement of technology and growing popularity of internet in business and communication, cybersecurity posed a global threat. This research focuses new Deep Learning (DL) model referred as FinSafeNet to secure loose cash tr
Externí odkaz:
https://doaj.org/article/d36b0f07267e410babb462406639aec5
Autor:
Asif Iqbal Kawoosa, Deepak Prashar, G R Anantha Raman, Anchit Bijalwan, Mohd Anul Haq, Mohammed Aleisa, Abdullah Alenizi
Publikováno v:
Energy Exploration & Exploitation, Vol 42 (2024)
Electricity theft detection (ETD) techniques employed to identify fraudulent consumers often fail to accurately pinpoint electricity thieves in real time. The patterns associated with electricity use are leveraged to identify anomalies indicative of
Externí odkaz:
https://doaj.org/article/6b5c30f8ad3940cfb9f4c3fbbc8f11e6
Publikováno v:
Heliyon, Vol 10, Iss 17, Pp e37163- (2024)
As facial modification technology advances rapidly, it poses a challenge to methods used to detect fake faces. The advent of deep learning and AI-based technologies has led to the creation of counterfeit photographs that are more difficult to discern
Externí odkaz:
https://doaj.org/article/299be0eb27b54867b716ad2f6deed7a5
Autor:
Mohammad Abrar, Didar Hussain, Izaz Ahmad Khan, Fasee Ullah, Mohd Anul Haq, Mohammed A. Aleisa, Abdullah Alenizi, Shashi Bhushan, Sheshikala Martha
Publikováno v:
Frontiers in Genetics, Vol 15 (2024)
Alternative splicing (AS) is a crucial process in genetic information processing that generates multiple mRNA molecules from a single gene, producing diverse proteins. Accurate prediction of AS events is essential for understanding various physiologi
Externí odkaz:
https://doaj.org/article/6f6130a08c994231b88793b3d70c3f75
Publikováno v:
Ain Shams Engineering Journal, Vol 15, Iss 6, Pp 102733- (2024)
Blockchain and artificial intelligence are innovative technologies that can securely process and share data across unreliable networks. Due to data leakage from user information, it is critical to keep the data confidential and completely protected b
Externí odkaz:
https://doaj.org/article/3f0dfd42eb7845e8ad0dbe238fa0445c
Publikováno v:
Electronic Research Archive, Vol 31, Iss 4, Pp 1876-1896 (2023)
Due to the complexities of systems thinking and the communication between independent Cyber-Physical Systems (CPSs) areas through accumulative expansion, several security threats are posed, such as deception of channels for information sharing, hardw
Externí odkaz:
https://doaj.org/article/c52d4bef97cb4199a795636c1f143e7a
Publikováno v:
Urology Video Journal, Vol 10, Iss , Pp 100078- (2021)
Externí odkaz:
https://doaj.org/article/426cd4bb924e4f56934a4325dba87238
Publikováno v:
Journal of Engineering and Applied Sciences. 10:54
In serverless computing, servers' computing resources are distributed dynamically by the cloud service provider. Consumers are charged based on the usage of resources, not on prepurchase computing capability. Programming models, abstractions, and pla
Publikováno v:
Urology Video Journal, Vol 10, Iss, Pp 100078-(2021)
Publikováno v:
ISSPIT
Cloud applications can be modeled as workflows. These workflows are represented by Directed Acyclic Graphs (DAGs) or non-DAGs. The graph shows the relationship between tasks that compose a workflow and the dependencies between these tasks. in our pre