Zobrazeno 1 - 10
of 75
pro vyhledávání: '"Ammar ALmomani"'
Autor:
Maali Alabdulhafith, Harshit Batra, Nagwan M. Abdel Samee, Mohammed Azmi Al-Betar, Ammar Almomani, Davut Izci, Serdar Ekinci, Fatma A. Hashim
Publikováno v:
IEEE Access, Vol 12, Pp 134948-134984 (2024)
This paper presents a modified bonobo optimizer (MBO) that integrates the Gaussian local mutation, restart strategy, and random contraction strategy into the original bonobo optimizer (BO). BO, inspired by the unique reproductive schemes and fission-
Externí odkaz:
https://doaj.org/article/e8212f7f260f416c8419ca9eef62752c
Autor:
Ammar Almomani, Khalid Nahar, Mohammad Alauthman, Mohammed Azmi Al-Betar, Qussai Yaseen, Brij B. Gupta
Publikováno v:
International Journal of Cognitive Computing in Engineering, Vol 5, Iss , Pp 14-26 (2024)
Cyberbullying detection on social media platforms is increasingly important, necessitating robust computational methods. Current approaches, while promising, have not fully leveraged the combined strengths of deep learning and traditional machine lea
Externí odkaz:
https://doaj.org/article/264a4dfbd3444a1da396a8bc24702770
Autor:
Waleed Alomoush, Osama A. Khashan, Ayat Alrosan, Hani H. Attar, Ammar Almomani, Fuad Alhosban, Sharif Naser Makhadmeh
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-17 (2023)
Abstract The proportion of multimedia traffic in data networks has grown substantially as a result of advancements in IT. As a result, it's become necessary to address the following challenges in protecting multimedia data: prevention of unauthorized
Externí odkaz:
https://doaj.org/article/5b95fc9cd2a844ce9414b37c0e7a2246
Autor:
Kwok Tai Chui, Brij B. Gupta, Priyanka Chaurasia, Varsha Arya, Ammar Almomani, Wadee Alhalabi
Publikováno v:
International Journal of Intelligent Networks, Vol 4, Iss , Pp 202-210 (2023)
The Internet plays a crucial role in our daily routines. Ensuring cybersecurity to Internet users will provide a safe online environment. Automatic network intrusion detection (NID) using machine learning algorithms has recently received increased at
Externí odkaz:
https://doaj.org/article/024bafa365eb4be680aa85ca7323bef4
Autor:
Ammar Almomani
Publikováno v:
Egyptian Informatics Journal, Vol 23, Iss 4, Pp 57-68 (2022)
Virtual Private Networks (VPNs) are one example of encrypted communication services commonly used to bypass censorship and access geographically locked services. This study performed VPN and non-VPN traffic analysis and developed a classification sys
Externí odkaz:
https://doaj.org/article/39dd96d33c8f4f6298deb5327ae4cce1
Autor:
Kwok Tai Chui, Brij B. Gupta, Jiaqi Liu, Varsha Arya, Nadia Nedjah, Ammar Almomani, Priyanka Chaurasia
Publikováno v:
Information, Vol 14, Iss 7, p 388 (2023)
The smart city vision has driven the rapid development and advancement of interconnected technologies using the Internet of Things (IoT) and cyber-physical systems (CPS). In this paper, various aspects of IoT and CPS in recent years (from 2013 to May
Externí odkaz:
https://doaj.org/article/bee294082be04f21b64282eeaa78e3ba
Autor:
Waleed Alomoush, Khairuddin Omar, Ayat Alrosan, Yazan M. Alomari, Dheeb Albashish, Ammar Almomani
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 32, Iss 5, Pp 599-607 (2020)
Firefly Algorithm (FA) is one of the new natural inspired optimization algorithms. It is inspired by the flashing behavior of the fireflies. Firefly algorithm, has some drawbacks such as getting trapped into several local optima, FA parameters are se
Externí odkaz:
https://doaj.org/article/acd210797e22483685a2c025067d621e
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 29, Iss 3, Pp 365-377 (2017)
Cloud computing depends on sharing distributed computing resources to handle different services such as servers, storage and applications. The applications and infrastructures are provided as pay per use services through data center to the end user.
Externí odkaz:
https://doaj.org/article/8c0b75b918fd4801b181403a771c519c
Autor:
Ammar Almomani, Mohammed Alweshah, Waleed Alomoush, Mohammad Alauthman, Aseel Jabai, Anwar Abbass, Ghufran Hamad, Meral Abdalla, Brij B. Gupta
Publikováno v:
Computers, Materials & Continua. 74:3045-3062
Publikováno v:
Computers, Materials & Continua. 75:5307-5319