Zobrazeno 1 - 10
of 114
pro vyhledávání: '"Norziana Jamil"'
Autor:
Zaid Abdi Alkareem Alyasseri, Rana Ghalib, Norziana Jamil, Husam Jasim Mohammed, Nor'ashikin Ali, Nabeel Salih Ali, Fahd N. Al-Wesabi, Mohammed Assiri
Publikováno v:
Alexandria Engineering Journal, Vol 91, Iss , Pp 115-125 (2024)
Recently, the technology of Underwater computer vision has played a vital role by improving the quality of underwater images owing to its significance in different applications in marines, such as military, resource development, biological research,
Externí odkaz:
https://doaj.org/article/0506b96e93654a33b2ea2de071722912
Autor:
Syed Shakir Hameed Shah, Norziana Jamil, Atta ur Rehman Khan, Lariyah Mohd Sidek, Nazik Alturki, Zuhaira Muhammad Zain
Publikováno v:
Egyptian Informatics Journal, Vol 26, Iss , Pp 100478- (2024)
Technological advancements have significantly progressed and innovated across various industries. However, these advancements have also led to an increase in cyberattacks using malware. Researchers have developed diverse techniques to detect and clas
Externí odkaz:
https://doaj.org/article/82f8b0ebe95d4f479784c9614bf7e60c
Publikováno v:
IEEE Access, Vol 12, Pp 11500-11519 (2024)
Three frequent factors such as low classification accuracy, computational complexity, and resource consumption have an impact on malware evaluation methods. These challenges are exacerbated by elements such as unbalanced data environments and specifi
Externí odkaz:
https://doaj.org/article/38dabc83b7454191830d3bab6e35920e
Autor:
Eghbal Hosseini, Abbas M. Al-Ghaili, Dler Hussein Kadir, Saraswathy Shamini Gunasekaran, Ali Najah Ahmed, Norziana Jamil, Muhammet Deveci, Rina Azlin Razali
Publikováno v:
Energy Strategy Reviews, Vol 53, Iss , Pp 101409- (2024)
The synergy between deep learning and meta-heuristic algorithms presents a promising avenue for tackling the complexities of energy-related modeling and forecasting tasks. While deep learning excels in capturing intricate patterns in data, it may fal
Externí odkaz:
https://doaj.org/article/d145dd53de814527a0819539adb46cf6
Autor:
Abbas M. Al-Ghaili, Saraswathy Shamini Gunasekaran, Norziana Jamil, Zaid Abdi Alkareem Alyasseri, Naif Mohammed Al-Hada, Zul-Azri Bin Ibrahim, Asmidar Abu Bakar, Hairoladenan Kasim, Eghbal Hosseini, Ridha Omar, Rafiziana Md. Kasmani, Rina Azlin Razali
Publikováno v:
IEEE Access, Vol 11, Pp 101924-101948 (2023)
Once an image has been processed by, for example, a robot machine, for the purpose of, for example, features extraction or meaningful information retrieval, has a secure scheme been applied to preserve security and privacy of such information before
Externí odkaz:
https://doaj.org/article/416d4da4273748478be88d701f31c0f2
Autor:
Mohamud Ahmed Jimale, Nor Aniza Abdullah, Miss Laiha Binti Mat Kiah, Mohd Yamani Idna Idris, Muhammad Reza Z'Aba, Norziana Jamil, Mohd Saufy Rohmad
Publikováno v:
IEEE Access, Vol 11, Pp 59661-59674 (2023)
Authenticated Encryption (AE) protects confidentiality and integrity at the same time. The sponge construction is based on an iterated permutation or transformation that can be used to implement hashing, and AE schemes, among others. Sponge-based AE
Externí odkaz:
https://doaj.org/article/0118df0868234f19907ade789f54eeb2
Autor:
Mohammed A. Al-Sharafi, Mohammad Iranmanesh, Mostafa Al-Emran, Ahmed Ibrahim Alzahrani, Fadi Herzallah, Norziana Jamil
Publikováno v:
Heliyon, Vol 9, Iss 5, Pp e16299- (2023)
Although extant literature has thoroughly investigated the incorporation of cloud computing services, examining their influence on sustainable performance, particularly at the organizational level, is insufficient. Consequently, the present research
Externí odkaz:
https://doaj.org/article/ea246ad9c1134a32996e8fa188688659
Publikováno v:
Heliyon, Vol 9, Iss 4, Pp e15257- (2023)
Many recently proposed lightweight block ciphers lack security evaluation against generic cryptanalytic attacks such as differential cryptanalysis. In this paper, we contribute towards security evaluation efforts by investigating four lightweight Fei
Externí odkaz:
https://doaj.org/article/519fbf20ec7b4345913405182f6e5d1f
Autor:
Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Binti Mat Kiah, Mohd Yamani Idna Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad
Publikováno v:
IEEE Access, Vol 10, Pp 14739-14766 (2022)
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research h
Externí odkaz:
https://doaj.org/article/538616fd19fd45fa9f9a74388974a766
Autor:
Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Binti Mat Kiah, Mohd Yamani Idna Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad
Publikováno v:
IEEE Access, Vol 10, Pp 50819-50838 (2022)
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance. The Block cipher was the dominant primitive in constructing AE schemes, followed by s
Externí odkaz:
https://doaj.org/article/e725c638c5524658865953402490d6f7