Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Amal, Abbas"'
Publikováno v:
TEM Journal. 11(2):543-551
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=1045853
Autor:
Zayid K. Almayahi, A. V. Raveendran, Rashid Al Malki, Amira Safwat, Muradjan Al Baloshi, Amal Abbas, Ahmed S. Al Salami, Sami M. Al Mujaini, Khalid Al Dhuhli, Said Al Mandhari
Publikováno v:
Bulletin of the National Research Centre, Vol 46, Iss 1, Pp 1-12 (2022)
Abstract Background The changing epidemiological profile of the COVID-19 pandemic and the uncertain clinical picture of patients characterise this ongoing and most challenging health event. Objectives To report clinical features, laboratory character
Externí odkaz:
https://doaj.org/article/397ecc8759fa486bba002ff72c6898e9
Publikováno v:
JES: Journal of Engineering Sciences, Vol 48, Iss No 1, Pp 82-93 (2020)
The architecture of any nation reflects the social and religious concepts of the citizens’ lifestyles, as well as the extent to which people in one nation are connected and influenced by other civilisations. The architectural style of the Kingdom o
Externí odkaz:
https://doaj.org/article/9ed045da817548a18e4ff9580875affc
Autor:
Rodolfo Mundaca-Uribe, Maya Holay, Amal Abbas, Nelly Askarinam, Janna Sofia Sage-Sepulveda, Luke Kubiatowicz, Ronnie H. Fang, Liangfang Zhang, Joseph Wang
Publikováno v:
ACS Nano. 17:9272-9279
Publikováno v:
Global Journal of Engineering and Technology Advances. 14:155-158
Intrusion detection system (IDS) is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies
Publikováno v:
journal of the college of basic education. 28:800-814
شهدت ايران خلال الفترة(1901-1925) ظهور النفط بكميات جعلت الدول الكبرى تتكالب للحصول على امتيازات منها استخراج وانتاج وتوزيع النفط لصالح شركا
Publikováno v:
TEM Journal. :543-551
Cyber-criminal attacks witnessed various phishing attacks that blindly attract users to use their secret personal information. This research highlights this type of attack and proposes the development of a new model to detect phishing websites. Two a
Autor:
Amal Abbas Kadhim, Azal Minshed Abid
Publikováno v:
International Journal of Engineering Research and Advanced Technology. :07-15
The increasing need for organizations to keep a high level of synchronization around the world and the coming of new advancements are pushing increasingly more to move decision-making and operational power from the focus of associations to their edge
Image segmentation is the most critical functions in image analysis and processing. Image segmentation is a mechanism used to divide an image into multiple segments. It will make image smooth and easy to evaluate. Segmentation is the most essential a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dcbc805235fd2a0bbec5412c72186c61
Autor:
Fangyu Zhang, Zhengxing Li, Yaou Duan, Amal Abbas, Rodolfo Mundaca-Uribe, Lu Yin, Hao Luan, Weiwei Gao, Ronnie H. Fang, Liangfang Zhang, Joseph Wang
Publikováno v:
Science robotics. 7(70)
The use of micromotors for active drug delivery via oral administration has recently gained considerable interest. However, efficient motor-assisted delivery into the gastrointestinal (GI) tract remains challenging, owing to the short propulsion life