Zobrazeno 1 - 10
of 3 965
pro vyhledávání: '"Alyami AS"'
Autor:
Hafiz TA, Alghamdi GS, Alkudmani ZS, Alyami AS, AlMazyed A, Alhumaidan OS, Mubaraki MA, Alotaibi FE
Publikováno v:
Infection and Drug Resistance, Vol Volume 17, Pp 571-581 (2024)
Taghreed A Hafiz,1 Ghadi S Alghamdi,1 Zeina S Alkudmani,1 Ahmed S Alyami,2 Abeer AlMazyed,2 Ohoud S Alhumaidan,1 Murad A Mubaraki,1 Fawzia E Alotaibi3 1Clinical Laboratory Sciences Department, College of Applied Medical Sciences, King Saud University
Externí odkaz:
https://doaj.org/article/633e38587e234aec88df30cde5cd022a
Autor:
Alyami J, Alsharif W, Almutairi FF, Alyami AS, Khalifa N, Angawi B, Alotaibi H, Aljedaani H, Alaabsi M, Alfuraih AM, Alyami MH
Publikováno v:
Advances in Medical Education and Practice, Vol Volume 13, Pp 797-808 (2022)
Jaber Alyami,1– 3 Walaa Alsharif,4 Fahad F Almutairi,1– 3 Ali S Alyami,5 Nahla Khalifa,6 Blal Angawi,1 Hussam Alotaibi,1 Haitham Aljedaani,1 Majed Alaabsi,1 Abdulrahman M Alfuraih,7 Mohammed H Alyami8 1Department of Diagnostic Radiology, Faculty
Externí odkaz:
https://doaj.org/article/191b5b3df66a4955ab82d2cd7d87c031
Autor:
Alyami, Sarah, Luqman, Hamzah
Continuous Sign Language Recognition (CSLR) focuses on the interpretation of a sequence of sign language gestures performed continually without pauses. In this study, we conduct an empirical evaluation of recent deep learning CSLR techniques and asse
Externí odkaz:
http://arxiv.org/abs/2406.12369
Autor:
Talukder, Md. Alamin, Islam, Md. Manowarul, Uddin, Md Ashraf, Hasan, Khondokar Fida, Sharmin, Selina, Alyami, Salem A., Moni, Mohammad Ali
Cybersecurity has emerged as a critical global concern. Intrusion Detection Systems (IDS) play a critical role in protecting interconnected networks by detecting malicious actors and activities. Machine Learning (ML)-based behavior analysis within th
Externí odkaz:
http://arxiv.org/abs/2401.12262
Despite encryption, the packet size is still visible, enabling observers to infer private information in the Internet of Things (IoT) environment (e.g., IoT device identification). Packet padding obfuscates packet-length characteristics with a high d
Externí odkaz:
http://arxiv.org/abs/2309.05941
Autor:
Abdullah Alharbi, Wael Alosaimi, Hashem Alyami, Bader Alouffi, Ahmed Almulihi, Mohd Nadeem, Mohd Asim Sayeed, Raees Ahmad Khan
Publikováno v:
BMC Medical Informatics and Decision Making, Vol 24, Iss 1, Pp 1-20 (2024)
Abstract The healthcare industry has been put to test the need to manage enormous amounts of data provided by various sources, which are renowned for providing enormous quantities of heterogeneous information. The data are collected and analyzed with
Externí odkaz:
https://doaj.org/article/6b55b38510c643a0890a54089f3ba9f6
Autor:
Alzayer M, Alkhulaifi MM, Alyami A, Aldosary MS, Alageel A, Garaween G, Alsalloum N, Shibl A, Al-Hamad AM, Doumith M
Publikováno v:
Infection and Drug Resistance, Vol Volume 17, Pp 3715-3722 (2024)
Maha Alzayer,1 Manal M Alkhulaifi,2 Ahmed Alyami,3 Mohammed S Aldosary,3 Abdulaziz Alageel,3 Ghada Garaween,1 Nada Alsalloum,1 Atef Shibl,1 Arif M Al-Hamad,4 Michel Doumith5 1Department of Microbiology and Immunology, College of Medicine, Alfaisal Un
Externí odkaz:
https://doaj.org/article/0c0041376a42452fa5e2b484c57b21db
Autor:
Nasirul Mumenin, Mohammad Abu Yousuf, Md Asif Nashiry, A. K. M. Azad, Salem A. Alyami, Pietro Lio', Mohammad Ali Moni
Publikováno v:
IET Computer Vision, Vol 18, Iss 5, Pp 666-681 (2024)
Abstract Autism Spectrum Disorder (ASD) is a chronic condition characterised by impairments in social interaction and communication. Early detection of ASD is desired, and there exists a demand for the development of diagnostic aids to facilitate thi
Externí odkaz:
https://doaj.org/article/06804082b4b248a5b05b678ef3c40d52
Autor:
Alyami, Mohammad H.1 (AUTHOR), Alyami, Hamad S.1 (AUTHOR) hsalmukalas@nu.edu.sa, Abdo, Asmaa M.2 (AUTHOR) hsalmukalas@nu.edu.sa, A. Sabry, Shereen2 (AUTHOR), El-Nahas, Hanan M.2 (AUTHOR), Ayoub, Margrit M.2 (AUTHOR)
Publikováno v:
Pharmaceutics. Aug2024, Vol. 16 Issue 8, p1026. 29p.
Deep learning models have been used in creating various effective image classification applications. However, they are vulnerable to adversarial attacks that seek to misguide the models into predicting incorrect classes. Our study of major adversaria
Externí odkaz:
http://arxiv.org/abs/2306.00314