Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Bayan Alabduallah"'
Autor:
Shoayee Dlaim Alotaibi, Bayan Alabduallah, Yahia Said, Siwar Ben Haj Hassine, Abdulaziz A. Alzubaidi, Maha Alamri, Samah Al Zanin, Jihen Majdoubi
Publikováno v:
Alexandria Engineering Journal, Vol 100, Iss , Pp 142-152 (2024)
With the fast growth of mobile phone usage, malicious threats against Android mobile devices are enhanced. The Android system utilizes a wide range of sensitive apps like banking apps; thus, it develops the aim of malware that uses the vulnerability
Externí odkaz:
https://doaj.org/article/4ae3b6abdd4a49dbaa760e489e49b9ea
Publikováno v:
IEEE Access, Vol 12, Pp 82926-82937 (2024)
The S-Box (Substitution Box) plays a crucial role in cryptographic security by introducing non-linearity and confusion into the encryption process. It enhances the resistance against cryptanalytic attacks, such as differential and linear cryptanalysi
Externí odkaz:
https://doaj.org/article/2cd8b835cd4544738b76a0f87064b4b1
Autor:
Leila Jamel, Muhammad Umer, Oumaima Saidani, Bayan Alabduallah, Shtwai Alsubai, Farruh Ishmanov, Tai-hoon Kim, Imran Ashraf
Publikováno v:
PeerJ Computer Science, Vol 10, p e1982 (2024)
Maternal healthcare is a critical aspect of public health that focuses on the well-being of pregnant women before, during, and after childbirth. It encompasses a range of services aimed at ensuring the optimal health of both the mother and the develo
Externí odkaz:
https://doaj.org/article/63ea660801184475b7b398f17748b368
Autor:
Ahmed S. Almasoud, Bayan Alabduallah, Hamed Alqahtani, Sumayh S. Aljameel, Saud S. Alotaibi, Abdullah Mohamed
Publikováno v:
Heliyon, Vol 10, Iss 3, Pp e25257- (2024)
Image encryption involves applying cryptographic approaches to convert the content of an image into an illegible or encrypted format, reassuring that illegal users cannot simply interpret or access the actual visual details. Commonly employed models
Externí odkaz:
https://doaj.org/article/59c88506281d46a58ba737fa6e38c61f
Autor:
Mohammed Aljebreen, Bayan Alabduallah, Hany Mahgoub, Randa Allafi, Manar Ahmed Hamza, Sara Saadeldeen Ibrahim, Ishfaq Yaseen, Mohamed Ibrahim Alsaid
Publikováno v:
Ain Shams Engineering Journal, Vol 14, Iss 11, Pp 102547- (2023)
The fusion of Internet of Things (IoT) and deep learning (DL) methods has proven valuable in automating vehicle detection and classification tasks on remote sensing images (RSI). This technology has broad applications, including traffic monitoring, u
Externí odkaz:
https://doaj.org/article/8b1e54fc2c4c4764b442c24bb216eb84
Autor:
Mohammed Aljebreen, Bayan Alabduallah, Mashael M. Asiri, Ahmed S. Salama, Mohammed Assiri, Sara Saadeldeen Ibrahim
Publikováno v:
IEEE Access, Vol 11, Pp 104984-104991 (2023)
ChatGPT, developed by OpenAI, is an advanced language model that excels at generating human-like text responses in conversational settings. As ChatGPT interacts with the user, it creates a range of sentiments from them, involving neutral, positive, o
Externí odkaz:
https://doaj.org/article/4cd35857bc4e436aa5f27ee3dbedefc0
Autor:
Fahad F. Alruwaili, Bayan Alabduallah, Hamed Alqahtani, Ahmed S. Salama, Gouse Pasha Mohammed, Amani A. Alneil
Publikováno v:
IEEE Access, Vol 11, Pp 87583-87591 (2023)
Blockchain (BC) and Artificial intelligence (AI) based technologies have earned a better reputation amongst the research community, especially in the medical field. BC technology has emerged as a promising solution to revolutionize the medical field
Externí odkaz:
https://doaj.org/article/c2998e2c4f214516abbf709b5c61fe16
Autor:
Alhayan, B. Venkatesh, Mudassir Khan, Bayan Alabduallah, Ajmeera Kiran, J. Chinna Babu, B. Bhargavi, Fatimah
Publikováno v:
Processes; Volume 11; Issue 6; Pages: 1674
Double-pipe counter-flow heat exchangers are considered more suitable for heat recovery in the heat transfer industry. Numerous studies havebeen conducted to develop static tools for optimizing operating parameters of heat exchangers. Using this stud