Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Mohammad Al Abdullah"'
Autor:
Mohammad AL Abdullah, Murtadha Raheem
Publikováno v:
Kufa Journal for Nursing Sciences. 10:23-27
Background: Molluscum Contagiusum is a common viral infection of the skin, caused by a poxvirus, commonly affects young children. The disease is common, although the incidence in most areas is not reliably known. An infection transmitted through cont
Autor:
Safwat Eldaboosy, Zainab Almoosa, Mustafa Saad, Mohammad Al Abdullah, Abdallah Farouk, Amgad Awad, Waheed Mahdy, Eman Abdelsalam, Sameh O Nour, Sameh Makled, Ahmed Shaarawy, Hatem Kanany, Samer Qarah, Ahmed Kabil
Publikováno v:
Infection and Drug Resistance.
Safwat Eldaboosy,1,2 Zainab Almoosa,3 Mustafa Saad,3 Mohammad Al Abdullah,3 Abdallah Farouk,4,5 Amgad Awad,6,7 Waheed Mahdy,4,8 Eman Abdelsalam,9,10 Sameh O Nour,1 Sameh Makled,1 Ahmed Shaarawy,1 Hatem Kanany,11 Samer Qarah,4 Ahmed Kabil1 1Department
Publikováno v:
International Journal of Agriculture & Environmental Science. 6:28-36
Autor:
Mohammad Al-Abdullah, Izzat Alsmadi
Publikováno v:
International Journal of Social Network Mining. 3:77
The volume of information users upload through online social networks (OSNs) is continuously growing. Our focus in this research is in evaluating models to quantify the volume and strengths of interactions between users in OSNs. In our first model, w
Autor:
Izzat Alsmadi, Mohammad Al-Abdullah
Publikováno v:
Lecture Notes in Social Networks ISBN: 9783319941042
Interactions of users in Online Social Networks (OSNs) offer interesting insights to a large spectrum of researchers from different domains. With the continuously increasing volume of data exchanged between those users, it is reasonable to think of m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::012fd64e1df0e25606fbdaa07fcf0bc9
https://doi.org/10.1007/978-3-319-94105-9_6
https://doi.org/10.1007/978-3-319-94105-9_6
Publikováno v:
Information Systems Security. 8:50-57
Encryption can be explained as the process of transforming information into an unintelligible form and thus making it extremely hard for others to understand the meaning of the message. Encryption can be used to disguise messages so that even if a me