Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Mohammed Hamzah Abed"'
Publikováno v:
Acta Technica Jaurinensis, Vol 17, Iss 3, Pp 111-117 (2024)
Routing represents a pivotal concern in the context of Wireless Sensor Networks (WSN) owing to its divergence from traditional network routing paradigms. The inherent dynamism of the WSN environment, coupled with the scarcity of available resources,
Externí odkaz:
https://doaj.org/article/82856c141ae14e9881bfeb9e05f3b1b3
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-14 (2024)
Abstract The preoperative diagnosis of brain tumors is important for therapeutic planning as it contributes to the tumors’ prognosis. In the last few years, the development in the field of artificial intelligence and machine learning has contribute
Externí odkaz:
https://doaj.org/article/b169d5defd5f44ba886a7ce4731574df
Publikováno v:
IEEE Access, Vol 11, Pp 115816-115826 (2023)
Based on Hilbert Random Secure Distribution, a novel data-hiding method for embedding secret information about the patient in a cover image MRI sample has been proposed. Least significant bit (LSB) and most significant bit (MSB) techniques are applie
Externí odkaz:
https://doaj.org/article/912922202db444858a2c0965fdddfacf
Biometric-based individual distinguishing proof is a successful strategy for consequently perceiving, with high certainty, an individual's character. The utilization of finger knuckle pictures for individual ID has shown promising outcomes and produc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fe1ceed44c78ab660d698019bd968028
https://zenodo.org/record/7307152
https://zenodo.org/record/7307152
Autor:
Yasmeen Sajid Razooqi, Mohammed Hamzah Abed, Ali Hakem Alsaeedi, Abayomi Moradeyo Otebolaku, Ali Saeed Dayem Alfoudi
Publikováno v:
International Journal of Intelligent Engineering and Systems. 14:469-478
Palm Vein Identification (PVI) is a modern biometric security technique used for enhancing security and\ud authentication systems. The key characteristics of palm vein patterns include its uniqueness to each individual, its\ud unforgettability, non-i
Artificial intelligent and application of computer vision are an exciting topic in last few years, and its key for many real time applications like video summarization, image retrieval and image classifications. One of the most trend method in deep l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bf7b3cd683152013d6f15b2124917df0
https://zenodo.org/record/6780929
https://zenodo.org/record/6780929
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789811676178
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::78bd07b574749a757387ce02ec603ec1
https://doi.org/10.1007/978-981-16-7618-5_14
https://doi.org/10.1007/978-981-16-7618-5_14
Publikováno v:
Expert Clouds and Applications ISBN: 9789811924996
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0cae91f61aa5c3eabd4fa20b8e6b8b0b
https://doi.org/10.1007/978-981-19-2500-9_37
https://doi.org/10.1007/978-981-19-2500-9_37
Publikováno v:
Mobile Computing and Sustainable Informatics ISBN: 9789811920684
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e133e4fe166aff391937a04dc02e74fd
https://doi.org/10.1007/978-981-19-2069-1_37
https://doi.org/10.1007/978-981-19-2069-1_37
Publikováno v:
Expert Clouds and Applications ISBN: 9789811621253
In this paper, the proposed research work study and focus on the effect of overlay topology adaptation and improved the search performance in a P2P overlay network. Two different search methods: Guided search vs. blind search have been studied and in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1762c38a7fdf62cd42ba9441363bb729
https://doi.org/10.1007/978-981-16-2126-0_7
https://doi.org/10.1007/978-981-16-2126-0_7