Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Mouad Lemoudden"'
Autor:
Madjid G. Tehrani, Eldar Sultanow, William J. Buchanan, Malik Amir, Anja Jeschke, Mahkame Houmani, Raymond Chow, Mouad Lemoudden
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-14 (2024)
Abstract For the first time, we enable the execution of hybrid quantum machine learning (HQML) methods on real quantum computers with 100 data samples and real-device-based simulations with 5000 data samples, thereby outperforming the current state o
Externí odkaz:
https://doaj.org/article/1ba815db21cd48d883354f71f21ed7bd
Autor:
Joseph Haddad, Nikolaos Pitropakis, Christos Chrysoulas, Mouad Lemoudden, William J. Buchanan
Publikováno v:
Cryptography, Vol 7, Iss 1, p 9 (2023)
Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to
Externí odkaz:
https://doaj.org/article/7dd012e65ce04cedbcc5669d725bd770
Publikováno v:
In Procedia Computer Science 2017 110:230-235
Publikováno v:
International Journal of Machine Learning and Computing. 10:316-322
Publikováno v:
Machine Learning for Networking ISBN: 9783030199449
MLN
MLN
Recently cloud computing has emerged the IT world. It eventually promoted the acquisition of resources and services as needed, but it has also instilled fear and user’s renunciations. However, Machine learning processing has proven high robustness
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d0b8b08f86de63b19a5d3084f64d1646
https://doi.org/10.1007/978-3-030-19945-6_6
https://doi.org/10.1007/978-3-030-19945-6_6
Publikováno v:
ANT/SEIT
Efficiently managing and analyzing cloud logs is a difficult and expensive task due the growth in size and variety of formats. In this paper, we propose a binary-based approach for frequency mining correlated attacks in log data. This approach is con
Publikováno v:
2016 Third International Conference on Systems of Collaboration (SysCo).
Real-time big data processing is a crucial need of meteorology today. As a matter of fact, the weather is a determining factor in decision making in different areas such as air or sea transport, so acquiring knowledge of the environment in real time
Publikováno v:
2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech).
The usage of cloud-computing architectures and characteristics has been enhanced in recent years. This approach brings the availability of storage and user services as needed. But it also brings many drawbacks that put the privacy and the security of
Autor:
Bouabid El Ouahidi, Mouad Lemoudden
Publikováno v:
WINCOM
Cloud computing is a fast-growing paradigm that has forcefully emerged and established itself in the next generation of IT industry and business, performing massive-scale and complex computing. As cloud technology adoption continues to progress, mass
Publikováno v:
Proceedings of the 4th Edition of National Security Days (JNS4).
Cloud technologies are increasingly important for IT department for allowing them to concentrate on strategy as opposed to maintaining data centers; the biggest advantages of the cloud is the ability to share computing resources between multiple prov