Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Adib, Omar"'
Autor:
Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee
Publikováno v:
PLoS ONE, Vol 19, Iss 1 (2024)
Externí odkaz:
https://doaj.org/article/3cfb67ff116e41d78180deb9c2565f1a
Autor:
Barbe, Coralie, Boiteux-Chabrier, Marie, Bouazzi, Leïla, El-Adib, Omar, Pham, Bach-Nga, Lourdelle, Alexandre, Hurtaud, Aline
Publikováno v:
In Archives de pédiatrie October 2023 30(7):458-465
Autor:
Malécot, Nicolas, Chrusciel, Jan, Sanchez, Stéphane, Sellès, Philippe, Goetz, Christophe, Lévêque, Henri-Paul, Parizel, Elizabeth, Pradel, Jean, Almhana, Mouklès, Bouvier, Elodie, Uyttenhove, Fabian, Bonnefoy, Etienne, Vazquez, Guillermo, Adib, Omar, Calvo, Philippe, Antoine, Colette, Jullien, Veronique, Cirille, Sylvia, Dumas, Antoine, Defasque, Anthony, Ben Ghorbal, Yassine, Elkadri, Marwan, Schertz, Mathieu, Cavet, Madeleine
Publikováno v:
In Academic Radiology June 2022 29(6):851-860
Autor:
Mishal Almazrooie, Azman Samsudin, Adnan Abdul-Aziz Gutub, Muhammad Syukri Salleh, Mohd Adib Omar, Shahir Akram Hassan
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 32, Iss 1, Pp 24-34 (2020)
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data. In this work, integrity verification methods for digital verses of the Holy Qu
Externí odkaz:
https://doaj.org/article/d2548039456f40009c3cdfb4eda66692
Publikováno v:
IEEE Access, Vol 7, Pp 96974-96983 (2019)
Many recent wireless sensor network (WSN) routing protocols are enhancements to address specific issues with the “low-energy adaptive clustering hierarchy” (LEACH) protocol. Since the performance of LEACH deteriorates sharply with increasing netw
Externí odkaz:
https://doaj.org/article/63de66232d25431d8f36b1ad987c8f8c
Publikováno v:
Journal of Computing Research and Innovation, Vol 3, Iss 4, Pp 1-11 (2018)
The main function of a one-stop e-government portal is to provide single access point to various e-government services for its users. It needs an effective architecture for integration and interoperability between a one-stop e-government portal and r
Externí odkaz:
https://doaj.org/article/f64ef59a76c34d57b243d64cd32eba1e
Autor:
Wadhah Mohammed M. Aqlan, Ghassan Ahmed Ali, Khairan Rajab, Adel Rajab, Asadullah Shaikh, Fekry Olayah, Shehab Abdulhabib Saeed Alzaeemi, Kim Gaik Tay, Mohd Adib Omar, Ernest Mangantig
Publikováno v:
Computers, Materials & Continua. :1-22
Publikováno v:
Sensors, Vol 21, Iss 21, p 7313 (2021)
The security warning is a representation of communication that is used to warn and to inform a person whether security menaces have been discovered in order to prevent any consequences of damage from taking place. The purpose of a security warning is
Externí odkaz:
https://doaj.org/article/1ff79c961a33476dbe4c9cb3ca5209ae
Autor:
Shahir Akram Hassan, Muhammad Syukri Salleh, Azman Samsudin, Mohd Adib Omar, Adnan Gutub, Mishal Almazrooie
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 32, Iss 1, Pp 24-34 (2020)
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data. In this work, integrity verification methods for digital verses of the Holy Qu
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783031170805
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2edd8cb20488dd146c614228bdb29174
https://doi.org/10.1007/978-3-031-17081-2_4
https://doi.org/10.1007/978-3-031-17081-2_4