Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Nooh Bany Muhammad"'
Publikováno v:
International Journal of Data and Network Science, Vol 6, Iss 4, Pp 1501-1518 (2022)
This study proceeds from a central interest in the importance of assessing the IS-Support provided to key-user groups. This study conceptualized a new multidimensional IS-Support construct with four dimensions: training, documentation, assistance and
Externí odkaz:
https://doaj.org/article/08127611b66b4eaaafe5cde78f0d385b
Autor:
Ahmad Rabaa'i, Enas Al-lozi, Qais Hammouri, Nooh Bany Muhammad, Ayman Abdalmajeed Alsmadi, Jassim Ahmad Al-Gasawneh
Publikováno v:
International Journal of Data and Network Science, Vol 6, Iss 4, Pp 1643-1658 (2022)
This study aims at investigating the factors that determine the continuous intention to use smartwatches, one of the most prevalent types of wearable devices. The study extends the expectation confirmation model (ECM) by incorporating other variables
Externí odkaz:
https://doaj.org/article/5a839e1b9db84c4e87ab61d5711df522
Publikováno v:
Mathematical Modelling of Engineering Problems. 8:575-582
Automatic modulation classification (AMC) is the emerging research area for military and civil applications. In this paper, M-PSK signals are classified using the optimized polynomial classifier. The distinct features i.e., higher order cumulants
Publikováno v:
IEIE Transactions on Smart Processing & Computing. 10:259-272
Publikováno v:
Mathematical Modelling of Engineering Problems. 7:441-449
Autor:
Nooh Bany Muhammad, Mariam Bazzi
Publikováno v:
2022 5th International Conference on Information and Computer Technologies (ICICT).
Autor:
Aya Kandil, Nooh Bany Muhammad
Publikováno v:
International Journal of Information and Computer Security. 15:357
In the current world, everyone needs to be connected to the internet. However, as technology develops, online scammers also advance with technology. To protect private information, the end users must ensure their data is protected. There are ways of
Autor:
Nooh Bany Muhammad
Publikováno v:
2018 International Conference on Information and Computer Technologies (ICICT).
As technology advances, security breaches, hacks and intentional false positives increase. Therefore, security is a hot and imperative topic that every individual and organization must keep in mind as a high priority subject. This paper will discuss