Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Eslam Hamouda"'
Autor:
Saleh N. Almuayqil, Murtada K. Elbashir, Mohamed Ezz, Mohanad Mohammed, Ayman Mohamed Mostafa, Meshrif Alruily, Eslam Hamouda
Publikováno v:
Applied Sciences, Vol 13, Iss 19, p 10919 (2023)
Cancer diagnosis and treatment depend on accurate cancer-type prediction. A prediction model can infer significant cancer features (genes). Gene expression is among the most frequently used features in cancer detection. Deep Learning (DL) architectur
Externí odkaz:
https://doaj.org/article/e698e3b04bef4463bfe0bcd872543164
Autor:
Ayman Mohamed Mostafa, Mohamed Ezz, Murtada K. Elbashir, Meshrif Alruily, Eslam Hamouda, Mohamed Alsarhani, Wael Said
Publikováno v:
Applied Sciences, Vol 13, Iss 19, p 10871 (2023)
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud security from unauthorized access and data breaches. Multi-factor authentication verifies that authentic cloud users are only authorized to access cloud apps
Externí odkaz:
https://doaj.org/article/2d8810cae9d346a293ff4cdbaff4858a
Publikováno v:
IET Biometrics, Vol 10, Iss 6, Pp 654-663 (2021)
Abstract Cancellable biometrics enabled us to develop robust authentication systems by replacing the storage of the original biometric template with another secured version. A technique called biometric salting uses a parameter (key) and an invertibl
Externí odkaz:
https://doaj.org/article/6883917e38ea415e9280068a993a27ec
Publikováno v:
PLoS ONE, Vol 13, Iss 5, p e0196707 (2018)
The kidney exchange programs bring new insights in the field of organ transplantation. They make the previously not allowed surgery of incompatible patient-donor pairs easier to be performed on a large scale. Mathematically, the kidney exchange is an
Externí odkaz:
https://doaj.org/article/7e0dfd2a0bba4cb9889c7c95b7e6f6e7
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 8, Iss 6 (2015)
Biometric system databases are vulnerable to many types of attacks. To address this issue, several biometric template protection systems have been proposed to protect biometric data against unauthorized use. Many of biometric protection systems requi
Externí odkaz:
https://doaj.org/article/ba5b2bb7e6ea487f8dbe4d61898dcf22
Autor:
Eslam Hamouda, Mohamed Ezz, Ayman Mohamed Mostafa, Murtada K. Elbashir, Meshrif Alruily, Mayada Tarek
Publikováno v:
Computer Systems Science and Engineering. 46:619-636
Autor:
Murtada K. Elbashir, Alshimaa Mahmoud, Ayman Mohamed Mostafa, Eslam Hamouda, Meshrif Alruily, Sadeem M. Alotaibi, Hosameldeen Shabana, Mohamed Ezz
Publikováno v:
Computers, Materials & Continua. 75:5105-5121
Autor:
Mohamed Ezz, Waad Alanazi, Ayman Mohamed Mostafa, Eslam Hamouda, Murtada K. Elbashir, Meshrif Alruily
Publikováno v:
Computer Systems Science and Engineering. 46:2299-2317
Publikováno v:
Arabian Journal for Science and Engineering. 46:8345-8353
Feature transformation methods can be used effectively to improve the performance of the machine learning techniques, such as classification and clustering, via enhancing the discrimination among the samples. Additionally, binary representation of fe
Publikováno v:
IET Wireless Sensor Systems. 10:145-153
Wireless sensor networks are an emerging technology deployed in many fields. Knowing the positions of sensor nodes is critical for many applications to perform their tasks. Hence, accurate node localisation in wireless sensor networks is an essential