Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Khalid Nazim Abdul Sattar"'
Publikováno v:
Advances in Sciences and Technology, Vol 17, Iss 2, Pp 322-329 (2023)
Technology is rising on daily basis with the advancement in web and artificial intelligence (AI), and big data developed by machines in various industries. All of these provide a gateway for cybercrimes that makes network security a challenging task.
Externí odkaz:
https://doaj.org/article/551691d8d67c46408a4ae3fb555b6c5a
Publikováno v:
PeerJ Computer Science, Vol 7, p e696 (2021)
Background This review focuses on reviewing the recent publications of swarm intelligence algorithms (particle swarm optimization (PSO), ant colony optimization (ACO), artificial bee colony (ABC), and the firefly algorithm (FA)) in scheduling and opt
Externí odkaz:
https://doaj.org/article/daa034e6faad4161b281c8c5114ae818
Autor:
Prabu Subramani, Khalid Nazim Abdul Sattar, Rocío Pérez de Prado, Balasubramanian Girirajan, Marcin Wozniak
Publikováno v:
Applied Sciences, Vol 11, Iss 17, p 7984 (2021)
Connected autonomous vehicles (CAVs) currently promise cooperation between vehicles, providing abundant and real-time information through wireless communication technologies. In this paper, a two-level fusion of classifiers (TLFC) approach is propose
Externí odkaz:
https://doaj.org/article/76584c24990b4d6abdb841caef6107e4
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 15 (2019)
International border security operations are diverse and include tasks to facilitate the legitimate movement of goods, thwart crime, maintain safety around borders and safeguard natural resources. All these operations are vital and enduring; however,
Externí odkaz:
https://doaj.org/article/a31ed139c9ca43c58acce6e4c822cf84
Autor:
Prominent Mugariri, Hanifa Abdullah, Miguel García-Torres, B. D. Parameshchari, Khalid Nazim Abdul Sattar
Publikováno v:
Mobile Information Systems. 2022:1-11
The Internet of Things (IoT) has had a considerable influence on our daily lives by enabling enhanced connection of devices, systems, and services that extends beyond machine-to-machine interactions and encompasses a wide range of protocols, domains,
Autor:
Nirmala S Guptha, V. Balamurugan, Geetha Megharaj, Khalid Nazim Abdul Sattar, J. Dhiviya Rose
Publikováno v:
Pattern Recognition Letters. 159:16-22
Publikováno v:
2022 IEEE International Conference on Data Science and Information System (ICDSIS).
Publikováno v:
International Journal of Computer Applications. 120:32-38
Digital video is being used widely in a variety of applications such as surveillance and security. Big amount of video in surveillance and security requires systems capable to process video automatically to detect events and track moving objects to a
Publikováno v:
International Journal of Computer Applications. 113:40-47
ailments have affected women since the time of the pharaohs, and can be traced back to the beginning of recorded medical history. It still poses a significant threat to the population. Statistics from the National Cancer Institute place breast cancer
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 15 (2019)
International border security operations are diverse and include tasks to facilitate the legitimate movement of goods, thwart crime, maintain safety around borders and safeguard natural resources. All these operations are vital and enduring; however,