Zobrazeno 1 - 10
of 200
pro vyhledávání: '"Ismail Taha"'
Autor:
Abdelhakeem A. Essa, Doaa Wadie Maximous Dawoud, Mohamed Anwar, Hussein Elkhayat, Ismail Taha
Publikováno v:
Egyptian Journal of Neurosurgery, Vol 39, Iss 1, Pp 1-6 (2024)
Abstract Objectives To report our experience with three cases of anterior lumbosacral meningocele with our multidisciplinary team plan and perioperative management and surgical approach for each case. Background Anterior meningocele is a rare congeni
Externí odkaz:
https://doaj.org/article/65d0bd8280444745a03cef428191270b
Publikováno v:
IEEE Access, Vol 12, Pp 11500-11519 (2024)
Three frequent factors such as low classification accuracy, computational complexity, and resource consumption have an impact on malware evaluation methods. These challenges are exacerbated by elements such as unbalanced data environments and specifi
Externí odkaz:
https://doaj.org/article/38dabc83b7454191830d3bab6e35920e
Publikováno v:
Computers, Vol 13, Iss 10, p 268 (2024)
The majority of applications use automatic image recognition technologies to carry out a range of tasks. Therefore, it is crucial to identify and classify image distortions to improve image quality. Despite efforts in this area, there are still many
Externí odkaz:
https://doaj.org/article/e77fa411bf14447cbe5b4038c66fc2ba
Publikováno v:
Applied Sciences, Vol 14, Iss 6, p 2614 (2024)
A significant quantity of malware is created on purpose every day. Users of smartphones and computer networks now mostly worry about malware. These days, malware detection is a major concern in the cybersecurity area. Several factors can impact malwa
Externí odkaz:
https://doaj.org/article/60d5bc5318d4464284c030ca97cc8eef
Autor:
Ismail Taha Ahmed, Joan Samin Ahmed
Publikováno v:
مجلة الآداب, Vol 2, Iss 144 (2023)
ان منطقة الدراسة تمتد من خط طول 44°59'22.68"Eشرقا الى خط طول 45°16'15.52"E شرقا ومن دائرة عرض34°11'21.3"N شمالا الى دائرة عرض 34°28'49.79"N شمالا وتتبلغ مساحتها
Externí odkaz:
https://doaj.org/article/39bfc20cb3474049b7768f87d7f2abad
Publikováno v:
Applied Sciences, Vol 12, Iss 24, p 12528 (2022)
The security of a computer system can be harmed by specific applications, such as malware. Malware comprises unwanted, dangerous enemies that aim to compromise the security and generate significant loss. Consequently, Malware Detection (MD) and Malwa
Externí odkaz:
https://doaj.org/article/599622a03d5c42e0b08c305922474e1d
Autor:
Mamdouh Sofan, Wafaa Hamama, Ibrahim Ibrahim EL-Hawary, Ismail Taha Ibrahim, Hanafi Hassan Zoorob
Publikováno v:
Acta Chimica Slovenica, Vol 66, Iss 3, Pp 592-602 (2019)
The new thiopyrano[2,3-b]pyridines 4–9 could be synthesized from the nicotinonitrile derivative 1. The cytotoxicity activity of the selected compounds 5, 6 and 8 was tested against MCF-7 and HCT-116 cell lines. The compound 5 (TP5) exhibited signif
Externí odkaz:
https://doaj.org/article/768b20b8657d4e86ac41452aaba285bf
Autor:
Baraa Tareq Hammad, Norziana Jamil, Ismail Taha Ahmed, Zuhaira Muhammad Zain, Shakila Basheer
Publikováno v:
Applied Sciences, Vol 12, Iss 15, p 7877 (2022)
Malware development has significantly increased recently, posing a serious security risk to both consumers and businesses. Malware developers continually find new ways to circumvent security research’s ongoing efforts to guard against malware attac
Externí odkaz:
https://doaj.org/article/e7e84dfc9e804749bbe5122dc7922fcb
Publikováno v:
Symmetry, Vol 14, Iss 2, p 236 (2022)
Steganography is the technique for secretly hiding messages in media such as text, audio, image, and video without being discovered. Image is one of the most essential media for concealing data, making it hard to identify hidden data not visible to t
Externí odkaz:
https://doaj.org/article/d74179d8dcbe47d2a9aaf4cad43eff34
Publikováno v:
Applied Sciences, Vol 11, Iss 18, p 8308 (2021)
Image watermarking is one of many methods for preventing unauthorized alterations to digital images. The major goal of the research is to find and identify photos that include a watermark, regardless of the method used to add the watermark or the sha
Externí odkaz:
https://doaj.org/article/985569d66ce844af9776488dad6c6fce