Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Amin, Azad"'
Autor:
Ramadhan, Wirya Mohommed1 wirya.ramadhan@su.edu.krd, Amin, Azad Ibrahen1,2,3
Publikováno v:
Iraqi Journal of Science. 2023, Vol. 64 Issue 7, p3468-3484. 17p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Proceedings of the ACM Web Conference 2023.
Autor:
Babak Amin Azad, Nick Nikiforakis
Publikováno v:
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy.
Autor:
Amin, Azad Arif Hama, Aladdin, Aso M., Hasan, Dler O., Mohammed-Taha, Soran R., Rashid, Tarik A.
Publikováno v:
Computation; Nov2023, Vol. 11 Issue 11, p231, 32p
Publikováno v:
Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 65:1029-1033
Robot vacuums are a type of every-day automation and may serve as a possible domain for studying human-automation interactions. Online reviews of four models of autonomous robot vacuums, representing different levels of price and automation, were col
Autor:
Amin Azad, Emily Moore
Publikováno v:
Proceedings of the Canadian Engineering Education Association (CEEA).
There are frequent calls for engineers to build integrated approaches to complex social and environmental problems. However, engineering education provides little opportunity to explore these "wicked problems". Given the complexity of the challenges,
Publikováno v:
Applied Intelligence. 52:254-281
Trillions of bytes of data are generated every day in different forms, and extracting useful information from that massive amount of data is the study of data mining. Sequential pattern mining is a major branch of data mining that deals with mining f
Publikováno v:
International Journal of Sciences and Emerging Technologies. 1
To ensure the quality of the process of energy meter manufacturing, the parameters which are electrically connected are manually calculated after every single step. The process of measuring manually become outdated, erroneous, and it also take more t
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment
When it comes to leaked credentials and credit card information, we observe the development and use of anti-fingerprinting browsers by malicious actors. These tools are carefully designed to evade detection, often by mimicking the browsing environmen