Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Mustafa Radif"'
Improving wavelet-based image compression using self-adaptive binary artificial bee colony algorithm
Publikováno v:
AIP Conference Proceedings.
Publikováno v:
Journal of Engineering and Applied Sciences. 14:10560-10568
Autor:
Mustafa Radif
Publikováno v:
Journal of Engineering and Applied Sciences. 14:9073-9085
Publikováno v:
Journal of Southwest Jiaotong University. 55
In this work, we will introduce a new procedure to solve a system of singular perturbation problems (SSPPs) via artificial neural networks. The neural networks use the code of back propagation with altered training algorithms such as quasi-Newton, Le
Publikováno v:
Journal of Southwest Jiaotong University. 55
Nowadays, optical character recognition is one of the most successful automatic pattern recognition applications. Many works have been done regarding the identification of Latin and Chinese characters. However, the reason for having few investigation
Autor:
Nora Ahmed Mohammed, Mustafa Radif
Publikováno v:
Journal of Southwest Jiaotong University. 54
With the advent of technology, electronic learning (e-learning) has become a key aspect of distance learning, making it easier, faster, and more global. With e-learning, teachers have found it easy to deliver education, while students have found new
Publikováno v:
Journal of Southwest Jiaotong University. 54
Using someone else's work or ideas without attribution is plagiarism, whether you meant to do it or not. Unintended plagiarism of snippet of text can have serious consequences and be a serious form of ethical misconduct. The current system is a web a
Publikováno v:
Journal of Southwest Jiaotong University. 54
Real-time image classification is one of the most challenging issues in understanding images and computer vision domain. Deep learning methods, especially Convolutional Neural Network (CNN), has increased and improved the performance of image process
Autor:
Mustafa Radif
Publikováno v:
2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT).
This research paper will provide an overview of the motivations, techniques, tactics, and procedures of cybercrime actors who misuse and exploit digital certificates and cryptographic key technologies for malicious intentions. The paper will focus on
Publikováno v:
Periodicals of Engineering and Natural Sciences (PEN). 7:1186
In this paper, “Building a common concept of analytical services for analyzing structured data” was proposed to build an analytical service to provide forecasts, descriptive and comparative data summaries using modern Microsoft technologies. This