Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Bassam Naji Al-Tamimi"'
Autor:
Nasrin Elhassan, Giuseppe Varone, Rami Ahmed, Mandar Gogate, Kia Dashtipour, Hani Almoamari, Mohammed A. El-Affendi, Bassam Naji Al-Tamimi, Faisal Albalwy, Amir Hussain
Publikováno v:
Computers, Vol 12, Iss 6, p 126 (2023)
Social media networks have grown exponentially over the last two decades, providing the opportunity for users of the internet to communicate and exchange ideas on a variety of topics. The outcome is that opinion mining plays a crucial role in analyzi
Externí odkaz:
https://doaj.org/article/cc0d0d46e8674dcbb0fee7443f2a7ec3
Autor:
Giuseppe Varone, Cosimo Ieracitano, Aybike Özyüksel Çiftçioğlu, Tassadaq Hussain, Mandar Gogate, Kia Dashtipour, Bassam Naji Al-Tamimi, Hani Almoamari, Iskender Akkurt, Amir Hussain
Publikováno v:
Entropy, Vol 25, Iss 2, p 253 (2023)
The development of reinforced polymer composite materials has had a significant influence on the challenging problem of shielding against high-energy photons, particularly X-rays and γ-rays in industrial and healthcare facilities. Heavy materials’
Externí odkaz:
https://doaj.org/article/6b244e3dbd614ae6ba901d522ada3d13
Publikováno v:
Journal of ICT, Vol 14 (2015)
Mixed IPv4/IPv6 networks will continue to use mobility support over tunneling mechanisms for a long period of time until the establishment of IPv6 end-to-end connectivity. Encapsulating IPv6 traffi c within IPv4 increases the level of hiding internal
Externí odkaz:
https://doaj.org/article/0bee565bae3346faa7b7559b0f99b07c
Autor:
Hussain, Nasrin Elhassan, Giuseppe Varone, Rami Ahmed, Mandar Gogate, Kia Dashtipour, Hani Almoamari, Mohammed A. El-Affendi, Bassam Naji Al-Tamimi, Faisal Albalwy, Amir
Publikováno v:
Computers; Volume 12; Issue 6; Pages: 126
Social media networks have grown exponentially over the last two decades, providing the opportunity for users of the internet to communicate and exchange ideas on a variety of topics. The outcome is that opinion mining plays a crucial role in analyzi
Autor:
Bassam Naji Al-Tamimi, Mandar Gogate, Kia Dashtipour, Ahsen Tahir, Amir Hussain, Mohammed Ahmed El-Affendi, Ahmad Hawalah, Rami Ahmed
Publikováno v:
Entropy
Offline Arabic Handwriting Recognition (OAHR) has recently become instrumental in the areas of pattern recognition and image processing due to its application in several fields, such as office automation and document processing. However, OAHR continu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6641e0452baff27dbe73bbe5a3a12f0c
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319990064
Nurse Rostering Problem (NRP) is a well-known NP-Hard combinatorial optimization problem. The fact is that coping real-world constraints in allocating the shift duties fairly among the available nurses is still a hard task to accomplish. The problem
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d9af1c4d6dfda79924c4479f8ca58974
https://doi.org/10.1007/978-3-319-99007-1_8
https://doi.org/10.1007/978-3-319-99007-1_8
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319990064
Cloud Computing (CC) is established as an important and widely used technology in enabling users to access to a shared pool of online resources. While alongside, the Internet of Things (IoT) has emerged as a new technology to enable multiple network-
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::88c87cd60eef1e79cca28c5d73d9eaea
https://doi.org/10.1007/978-3-319-99007-1_39
https://doi.org/10.1007/978-3-319-99007-1_39
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319990064
As Internet networks expand, the amount of network threats and intrusions increased, the demand for an efficient and reliable defense system is required to detect network security vulnerabilities. Intrusion Detection Systems (IDS) are a vital constit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5c7a5ba4844db6aa7c48b0d47bf7cbcd
https://doi.org/10.1007/978-3-319-99007-1_57
https://doi.org/10.1007/978-3-319-99007-1_57
Publikováno v:
Journal of ICT (2015)
Mixed IPv4/IPv6 networks will continue to use mobility support over tunneling mechanisms for a long period of time until the establishment of IPv6 end-to-end connectivity. Encapsulating IPv6 traffi c within IPv4 increases the level of hiding internal
Publikováno v:
SITA
This study presents an innovative approach to develop a course specification that considers the effect of the covered topics in a course on the entire program learning outcomes. This study presents a practical methodology enabling instructors to desi