Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Amjed Abbas Ahmed"'
Publikováno v:
Elektronika ir Elektrotechnika, Vol 29, Iss 6, Pp 50-57 (2023)
Power side channel analysis signal analysis is automated using deep learning. Signal processing and cryptanalytic techniques are necessary components of power side channel analysis. Chip leakages can be found using a classification approach called de
Externí odkaz:
https://doaj.org/article/eb5e10d9e17f4ca8861a2d2b94aa6639
Autor:
Israa Akram Alzuabidi, Layla Safwat Jamil, Amjed Abbas Ahmed, Shahrul Azman Mohd Noah, Mohammad Kamrul Hasan
Publikováno v:
Elektronika ir Elektrotechnika, Vol 29, Iss 5, Pp 70-78 (2023)
Today, social media sites like Twitter provide effective platforms to share opinions and thoughts in public with millions of other users. These opinions shared on such sites influence a large number of people who may easily retweet them and accelerat
Externí odkaz:
https://doaj.org/article/13c9f20917554b1d8f5551beb92f8db8
Autor:
Amjed Abbas Ahmed, Mohammad Kamrul Hasan, Shayla Islam, Azana Hafizah Mohd Aman, Nurhizam Safie
Publikováno v:
Elektronika ir Elektrotechnika, Vol 29, Iss 4, Pp 76-81 (2023)
Deep learning (DL) is a new option that has just been made available for side-channel analysis. DL approaches for profiled side-channel attacks (SCA) have dominated research till now. In this attack, the attacker has complete control over the profili
Externí odkaz:
https://doaj.org/article/710a0956b14c4a1789d1ac9ed4be8346
Autor:
Amjed Abbas Ahmed, Mohammad Kamrul Hasan, Mustafa Musa Jaber, Sumaia Mohammed Al-Ghuribi, Dhafar Hamed Abd, Wasiq Khan, Ahmed Tareq Sadiq, Abir Hussain
Publikováno v:
IEEE Access, Vol 11, Pp 68428-68438 (2023)
The linguistics related research and particularly, sentiment analysis using data-driven approaches, has been growing in recent years. However, the large number of users and excessive amount of information available on social media, make it difficult
Externí odkaz:
https://doaj.org/article/0ec82d440320423c9c2fc76b7d986516
Publikováno v:
Journal of ICT Research and Applications, Vol 16, Iss 1 (2022)
Mobile Robot is an extremely essential technology in the industrial world. Optimal path planning is essential for the navigation of mobile robots. The firefly algorithm is a very promising tool of Swarm Intelligence, which is used in various optimiza
Externí odkaz:
https://doaj.org/article/cdf30ce37d754e249d3ebcdcb83fd184
Publikováno v:
AIP Conference Proceedings.
Because of COVID-19, healthcare became the first interesting domain at the world. Here, comes the role of researchers to do what they can to guide people. Nowadays, the most wanted field is beauty industry. It achieved large market. And the estimatio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::54f269e194c46c08fe3a75cf23200bc9
https://zenodo.org/record/7312879
https://zenodo.org/record/7312879
Autor:
Amjed Abbas Ahmed
Publikováno v:
Intelligent Computing in Engineering ISBN: 9789811527791
The main objective of ubiquitous computation is the establishment of environments where devices with processing and communications capabilities (mobile telephones, PDAs, sensing devices, electrical appliances, electronic books, etc.) can cooperate an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::56f5513751eac015940fff5bc3529b0a
https://doi.org/10.1007/978-981-15-2780-7_77
https://doi.org/10.1007/978-981-15-2780-7_77
Autor:
Ali Hamza Najim, Amjed Abbas Ahmed
Publikováno v:
Iraqi Administrative Sciences Journal. 2:447-460
This paper presents a descriptive information for the E-Learning, its design and development as well as the application and its management taking into consideration of its major components. In recent times, E-Learning applications has done one major
Publikováno v:
Periodicals of Engineering and Natural Sciences (PEN). 9:309
The task of recognizing arguments and their components in text is known as argument extraction. Most arguments might be broken down into a petition and at least one premise that support it. A method to extract arguments is suggested in this work. The