Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Farhan A Alenizi"'
Autor:
Mehdi Hosseinzadeh, Dildar Hussain, Firas Muhammad Zeki Mahmood, Farhan A Alenizi, Amirhossein Noroozi Varzeghani, Parvaneh Asghari, Aso Darwesh, Mazhar Hussain Malik, Sang-Woong Lee
Publikováno v:
PLoS ONE, Vol 19, Iss 5, p e0301275 (2024)
Skin cancer has a significant impact on the lives of many individuals annually and is recognized as the most prevalent type of cancer. In the United States, an estimated annual incidence of approximately 3.5 million people receiving a diagnosis of sk
Externí odkaz:
https://doaj.org/article/7f748263e7d34d99af849ce81dc827c3
Autor:
Mehdi Hosseinzadeh, Adil Hussein Mohammed, Amir Masoud Rahmani, Farhan A Alenizi, Seid Miad Zandavi, Efat Yousefpoor, Omed Hassan Ahmed, Mazhar Hussain Malik, Lilia Tightiz
Publikováno v:
PLoS ONE, Vol 18, Iss 10, p e0290119 (2023)
Patients must always communicate with their doctor for checking their health status. In recent years, wireless body sensor networks (WBSNs) has an important contribution in Healthcare. In these applications, energy-efficient and secure routing is rea
Externí odkaz:
https://doaj.org/article/e48db4a98be64a9890a877f0b2fc0ae1
Publikováno v:
Multimedia Tools and Applications.
Autor:
Tao Hai, Farhan A. Alenizi, Adil Hussein Mohammed, Bhupendra Singh Chauhan, Basim Al-Qargholi, Ahmed Sayed Mohammed Metwally, Mirzat Ullah
Publikováno v:
International Communications in Heat and Mass Transfer. 145:106848
Autor:
Shrutika S. Sawant, Manoharan Prabukumar, Agilandeeswari Loganathan, Farhan A. Alenizi, Subodh Ingaleshwar
Hyperspectral band selection is one of the efficacious ways to diminish the size of hyperspectral images. The process of selecting a few useful bands will be successful when two fundamental aspects are considered: information abundance and redundancy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f7bd4e744c6450d193aab61743a28b04
https://publica.fraunhofer.de/handle/publica/445568
https://publica.fraunhofer.de/handle/publica/445568
Publikováno v:
ACSSC
A 3d mesh blind optimized watermarking technique is proposed in this paper. The technique relies on the displacement process of the vertices locations depending on the modification of the variances of the vertices's norms. Statistical analysis were p
Autor:
Mimouna Abdullah Alkhonaini, Entesar Gemeay, Firas Muhammad Zeki Mahmood, Mohamed Ayari, Farhan A. Alenizi, Sangkeum Lee
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-15 (2024)
Abstract Due to their simplicity of implementation and compliance with the encryption issue, chaotic models are often utilized in picture encryption applications. Despite having many benefits, this approach still has a crucial space issue that makes
Externí odkaz:
https://doaj.org/article/2810424c87e34cc2bdf401009247a38b
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-16 (2024)
Abstract One of the biggest problems with Internet of Things (IoT) applications in the real world is ensuring data integrity. This problem becomes increasingly significant as IoT expands quickly across a variety of industries. This study presents a b
Externí odkaz:
https://doaj.org/article/fee9acc6488e4de5bfaf743bfe7c6cbe
Autor:
Gyana Ranjana Panigrahi, Prabira Kumar Sethy, Santi Kumari Behera, Manoj Gupta, Farhan A. Alenizi, Aziz Nanthaamornphong
Publikováno v:
IEEE Access, Vol 12, Pp 88913-88926 (2024)
This paper introduces an innovative methodology to disrupt deep-learning (DL) surveillance systems by implementing an adversarial framework strategy, inducing misclassification in live video objects and extending attacks to real-time models. Focusing
Externí odkaz:
https://doaj.org/article/f653a224d1784682b5fac07207476be2
Autor:
Gyana Ranjana Panigrahi, Prabira Kumar Sethy, Santi Kumari Behera, Manoj Gupta, Farhan A. Alenizi, Pannee Suanpang, Aziz Nanthaamornphong
Publikováno v:
IEEE Access, Vol 12, Pp 83043-83056 (2024)
Contemporary culture presents a substantial obstacle for cyber security experts in the shape of software vulnerabilities, which, if taken advantage of, can jeopardize the Confidentiality, Integrity, and Availability (CIA) of any system. Data-driven a
Externí odkaz:
https://doaj.org/article/5918fd4439814bc8bccff76e10edfbb5