Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Ahmad K. Al hwaitat"'
Publikováno v:
Symmetry, Vol 16, Iss 8, p 966 (2024)
In this paper, we introduce a novel optimization algorithm called the OX optimizer, inspired by oxen animals, which are characterized by their great strength. The OX optimizer is designed to address the challenges posed by complex, high-dimensional o
Externí odkaz:
https://doaj.org/article/1a2bf912b3d149f3a2113b7f28d267f5
Autor:
Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara, Ahmad K. Al Hwaitat
Publikováno v:
Information, Vol 15, Iss 1, p 27 (2024)
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors
Externí odkaz:
https://doaj.org/article/fcc33dd3790f4c7a8470fa880acfc92c
Autor:
Mohammad Hashem Ryalat, Hussam N. Fakhouri, Jamal Zraqou, Faten Hamad, Mamon S. Alzboun, Ahmad K. Al hwaitat
Publikováno v:
International Journal of Advanced Computer Science and Applications. 14
Autor:
Saher Manaseer, Ahmad K. Al Hwaitat, Imad Salah, Rizik M. H. Al-Sayyed, Sarah E. Shukri, Hamed S. Al-Bdour
Publikováno v:
Journal of Experimental & Theoretical Artificial Intelligence. 34:749-780
PSO is a remarkable tool for solving several optimisation problems, like global optimisation and many real-life problems. It generally explores global optimal solution via exploiting the particle –...
Autor:
Aitizaz Ali, Muhammad Fermi Pasha, Ong Huey Fang, Rahim Khan, Mohammed Amin Almaiah, Ahmad K. Al Hwaitat
Publikováno v:
Big Data Intelligence for Smart Applications ISBN: 9783030879532
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::35133a042c6b9564f65938c6c3439eeb
https://doi.org/10.1007/978-3-030-87954-9_13
https://doi.org/10.1007/978-3-030-87954-9_13
Autor:
Ahmad K. Al Hwaitat
Publikováno v:
International Journal of Advanced Trends in Computer Science and Engineering. 9:247-254
Autor:
Mohammed Amin Almaiah, Omar Almomani, Adeeb Alsaaidah, Shaha Al-Otaibi, Nabeel Bani-Hani, Ahmad K. Al Hwaitat, Ali Al-Zahrani, Abdalwali Lutfi, Ali Bani Awad, Theyazn H. H. Aldhyani
Publikováno v:
Electronics; Volume 11; Issue 21; Pages: 3571
The growing number of security threats has prompted the use of a variety of security techniques. The most common security tools for identifying and tracking intruders across diverse network domains are intrusion detection systems. Machine Learning cl
Autor:
Rania M.Asaifi, Ahmad K. Al Hwaitat, Ahmad Althunibat, Mohammed Amin Almaiah, Rizik M. Al-Sayed, Khalid K. Adhim, Omar Almomani, Adeeb Alsaaidah, Mohammed Al-Zahrani
Publikováno v:
International Journal of Advanced Computer Science and Applications. 11
Jamming attack is one of the most common threats on wireless networks through sending a high-power signal to the network in order to corrupt legitimate packets. To address Jamming attacks problem, the Particle Swarm Optimization (PSO) algorithm is us
Autor:
Saher Manaseer, Ahmad K. Al Hwaitat
Publikováno v:
International Journal of Engineering Research and Science. 3:34-38
Recently the world of web applications has witnessed a huge wave of attacks that caused a lot of web applications to get defaced and for a lot of businesses to lose financially and to lose the integrity between those companies and their users .since
Publikováno v:
Scientific Research and Essays. 11:90-96
Web optimization is the process of optimizing the web to increase visibility or rank of websites in search engines. Furthermore, this process is also viewed from multiple perspectives, from optimizing inter-server communication that offers the best r