Zobrazeno 1 - 10
of 40
pro vyhledávání: '"Ayman Mohamed Mostafa"'
Publikováno v:
Applied Sciences, Vol 14, Iss 8, p 3280 (2024)
In this study, we introduce a novel combination of layer-static-weighted attention and ascending feature selection techniques to predict the seriousness level of adverse drug events using the Food and Drug Administration (FDA) Adverse Event Reporting
Externí odkaz:
https://doaj.org/article/725a059d0ad348fe8ed88273d8ab9a72
Autor:
Ahmed Alsayat, Mahmoud Elmezain, Saad Alanazi, Meshrif Alruily, Ayman Mohamed Mostafa, Wael Said
Publikováno v:
Diagnostics, Vol 13, Iss 21, p 3364 (2023)
Retinal blood vessel segmentation is a valuable tool for clinicians to diagnose conditions such as atherosclerosis, glaucoma, and age-related macular degeneration. This paper presents a new framework for segmenting blood vessels in retinal images. Th
Externí odkaz:
https://doaj.org/article/f900448a770748059d1cb68c7def87cd
Publikováno v:
Sensors, Vol 23, Iss 20, p 8599 (2023)
One of the most prevalent diseases affecting women in recent years is breast cancer. Early breast cancer detection can help in the treatment, lower the infection risk, and worsen the results. This paper presents a hybrid approach for augmentation and
Externí odkaz:
https://doaj.org/article/e2e27b40b1b54c109d19047c80374ff5
Autor:
Saleh N. Almuayqil, Murtada K. Elbashir, Mohamed Ezz, Mohanad Mohammed, Ayman Mohamed Mostafa, Meshrif Alruily, Eslam Hamouda
Publikováno v:
Applied Sciences, Vol 13, Iss 19, p 10919 (2023)
Cancer diagnosis and treatment depend on accurate cancer-type prediction. A prediction model can infer significant cancer features (genes). Gene expression is among the most frequently used features in cancer detection. Deep Learning (DL) architectur
Externí odkaz:
https://doaj.org/article/e698e3b04bef4463bfe0bcd872543164
Autor:
Ayman Mohamed Mostafa, Mohamed Ezz, Murtada K. Elbashir, Meshrif Alruily, Eslam Hamouda, Mohamed Alsarhani, Wael Said
Publikováno v:
Applied Sciences, Vol 13, Iss 19, p 10871 (2023)
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud security from unauthorized access and data breaches. Multi-factor authentication verifies that authentic cloud users are only authorized to access cloud apps
Externí odkaz:
https://doaj.org/article/2d8810cae9d346a293ff4cdbaff4858a
Publikováno v:
Applied Sciences, Vol 13, Iss 8, p 5047 (2023)
A cerebral stroke is a medical problem that occurs when the blood flowing to a section of the brain is suddenly cut off, causing damage to the brain. Brain cells gradually die because of interruptions in blood supply and other nutrients to the brain,
Externí odkaz:
https://doaj.org/article/01115be5e8754e4595de13c9de5374f3
Publikováno v:
Applied Sciences, Vol 13, Iss 6, p 3482 (2023)
Social media platforms like Twitter are commonly used by people interested in various activities, interests, and subjects that may cover their everyday activities and plans, as well as their thoughts on religion, technology, or the products they use.
Externí odkaz:
https://doaj.org/article/dccfcf29a79841389616eecf3d03bfef
Publikováno v:
Applied Sciences, Vol 13, Iss 4, p 2074 (2023)
Sentiment analysis is considered one of the significant trends of the recent few years. Due to the high importance and increasing use of social media and electronic services, the need for reviewing and enhancing the provided services has become cruci
Externí odkaz:
https://doaj.org/article/4666f3b5157349a9adbf0f0ce1a78aee
Publikováno v:
IEEE Access, Vol 8, Pp 55354-55371 (2020)
Securing passwords either written or spoken is considered one of the challenging authentication issues faced by individuals and organizations. Written passwords could be easily stolen by look over, or man-behind, while spoken passwords could be recor
Externí odkaz:
https://doaj.org/article/122771d24a2e4527a8c2ed90a11cf6e5
Autor:
Wael Said, Ayman Mohamed Mostafa
Publikováno v:
IEEE Access, Vol 8, Pp 145332-145362 (2020)
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required. Intrusio
Externí odkaz:
https://doaj.org/article/16884ba773f74e9b872be9ef9793a4c5