Zobrazeno 1 - 10
of 53
pro vyhledávání: '"Nabil El Akkad"'
Autor:
Hanae Moussaoui, Nabil El Akkad, Mohamed Benslimane, Walid El-Shafai, Abdullah Baihan, Chaminda Hewage, Rajkumar Singh Rathore
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-17 (2024)
Abstract Vehicle identification systems are vital components that enable many aspects of contemporary life, such as safety, trade, transit, and law enforcement. They improve community and individual well-being by increasing vehicle management, securi
Externí odkaz:
https://doaj.org/article/50f720b779ee4fbfbaaa4409e3a0e4f8
Publikováno v:
IEEE Access, Vol 12, Pp 5212-5221 (2024)
In this work, we propose a novel approach to enhancing the security of passwords before storing them in databases. Our method utilizes Braille transformation to encrypt the password after generating the corresponding hash. The hash is divided into mu
Externí odkaz:
https://doaj.org/article/3a2fc6e4380642fc87995739977085f4
Autor:
Mohammed Es-sabry, Nabil El Akkad, Lahbib Khrissi, Khalid Satori, Walid El-Shafai, Torki Altameem, Rajkumar Singh Rathore
Publikováno v:
Egyptian Informatics Journal, Vol 25, Iss , Pp 100449- (2024)
In this study, we introduce a refined approach to encrypting 32-bit color images, leveraging the potential of four 1D chaotic maps – the Logistic map, Tent map, Chebyshev map, and Sine map. These chaotic maps intricately populate the four matrices
Externí odkaz:
https://doaj.org/article/850a2dd31d0f45c9bd8ddbceb05ca642
Publikováno v:
Journal of Engineering and Applied Science, Vol 70, Iss 1, Pp 1-20 (2023)
Abstract In the present study, we aim to propose an effective and robust ensemble-learning approach with stacked generalization for image segmentation. Initially, the input images are processed for feature extraction and edge detection using the Gabo
Externí odkaz:
https://doaj.org/article/fad3aacc36a44e9aadc3b0c5986d1ed4
Autor:
Mohammed Es-Sabry, Nabil El Akkad, Mostafa Merras, Khalid Satori, Walid El-Shafai, Torki Altameem, Mostafa M. Fouda
Publikováno v:
IEEE Access, Vol 11, Pp 100856-100878 (2023)
With the growing need for secure multimedia data transmission, image encryption has become an important research area. Traditional encryption algorithms like RSA are not well-suited for this purpose, leading researchers to explore new approaches such
Externí odkaz:
https://doaj.org/article/a5d49eca045b41f091f85e50f7a7e704
Publikováno v:
Scientific African, Vol 16, Iss , Pp e01217- (2022)
This paper proposes a new and efficient color image encryption algorithm based on multiple chaotic maps (Logistic map, Sine map, and Chebyshev map) and the intersecting planes method inside a cube. All maps were used to fill the three adjacent faces
Externí odkaz:
https://doaj.org/article/a5dba1a9d4db440fa0160058990fef79
Publikováno v:
International Journal of Information Security and Privacy. 17:1-17
The potential of machine learning mechanisms played a key role in improving the intrusion detection task. However, other factors such as quality of data, overfitting, imbalanced problems, etc. may greatly affect the performance of an intelligent intr
Publikováno v:
International Journal of Computing. :159-168
Image segmentation is a fundamental and important step in many computer vision applications. One of the most widely used image segmentation techniques is clustering. It is a process of segmenting the intensities of a non-homogeneous image into homoge
Publikováno v:
SN Computer Science. 4
Publikováno v:
Digital Technologies and Applications ISBN: 9783031298592
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0cdd00e2b2565ca54eef9685823a6d50
https://doi.org/10.1007/978-3-031-29860-8_97
https://doi.org/10.1007/978-3-031-29860-8_97