Zobrazeno 1 - 10
of 399
pro vyhledávání: '"Musa, Ahmad"'
Autor:
Musa, Ahmad S., Awan, Irfan U.
Yes
Researchers have used the simulation technique to develop new networks and test, modify, and optimize existing ones. The scientific community has developed a wide range of network simulators to fulfil these objectives and facilitate this cre
Researchers have used the simulation technique to develop new networks and test, modify, and optimize existing ones. The scientific community has developed a wide range of network simulators to fulfil these objectives and facilitate this cre
Externí odkaz:
http://hdl.handle.net/10454/18882
Yes
Biometric of Intent (BoI) is a Computer Vision (CV) automation, using Artificial Intelligence (AI) techniques, which presents a new approach that extends the reach of the classic biometric identification process. It provides an efficient mec
Biometric of Intent (BoI) is a Computer Vision (CV) automation, using Artificial Intelligence (AI) techniques, which presents a new approach that extends the reach of the classic biometric identification process. It provides an efficient mec
Externí odkaz:
http://hdl.handle.net/10454/16653
yes
Cyber-attacks have been an increasing threat on people and organisations, which led to massive unpleasant impact. Therefore, there were many solutions to handle cyber-attacks, including Intrusion Detection Systems (IDS), Intrusion Prevention
Cyber-attacks have been an increasing threat on people and organisations, which led to massive unpleasant impact. Therefore, there were many solutions to handle cyber-attacks, including Intrusion Detection Systems (IDS), Intrusion Prevention
Externí odkaz:
http://hdl.handle.net/10454/16652
yes
Peer-to-Peer (P2P) network is increasingly becoming the most important means of trading content throughout the last years due to the constant evolvement of the cyber world. This popularity made the P2P network susceptible to the spread of ma
Peer-to-Peer (P2P) network is increasingly becoming the most important means of trading content throughout the last years due to the constant evolvement of the cyber world. This popularity made the P2P network susceptible to the spread of ma
Externí odkaz:
http://hdl.handle.net/10454/16651
Autor:
Musa, Ahmad S.
Peer-to-Peer (P2P) Networks have been presenting many fascinating capabilities to the internet since their inception, which has made and is still gathering so much interest. As a result, it is being used in many domains, particularly in transferring
Externí odkaz:
http://hdl.handle.net/10454/19762
Autor:
El-Salam Abu-Musa, Ahmad Abd1 ahmadabumusa@gmail.com, Rayan, Ahmed Mohamed2
Publikováno v:
International Journal of Accounting & Management Sciences (IJAMS). Oct2024, Vol. 3 Issue 4, p507-556. 50p.
Autor:
Marey, Nada1 nada_marey@commerce.tanta.edu.eg, Abu-Musa, Ahmad A.2 ahmed.aboumousa@commerce.tanta.edu.eg, Ganna, Mona3 mona.gana@commerce.tanta.edu.eg
Publikováno v:
International Journal of Accounting & Management Sciences (IJAMS). Oct2024, Vol. 3 Issue 4, p479-506. 28p.
Autor:
Musa, Ahmad, Hakim, Mohammad Lutful, Alam, Touhidul, Islam, Mohammad Tariqul, Alamri, Saeed, Alshammari, Ahmed S., Soliman, Mohamed S.
Publikováno v:
In Sensors and Actuators: A. Physical 16 April 2024 369
We study the language of food on Twitter during the pandemic lockdown in the United States, focusing on the two month period of March 15 to May 15, 2020. Specifically, we analyze over770,000 tweets published during the lockdown and the equivalent per
Externí odkaz:
http://arxiv.org/abs/2010.07466
Autor:
Abdelwahed, Ahmed S.1 (AUTHOR) a.saad@cu.edu.eg, Abu-Musa, Ahmad A.2 (AUTHOR), Moubarak, Hosam3 (AUTHOR), Badawy, Hebatallah A.4 (AUTHOR)
Publikováno v:
South African Journal of Accounting Research. May2024, Vol. 38 Issue 2, p113-145. 33p.