Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Ola Surakhi"'
Autor:
Tareq Hussein, Mahmoud H. Hammad, Ola Surakhi, Mohammed AlKhanafseh, Pak Lun Fung, Martha A. Zaidan, Darren Wraith, Nidal Ershaidat
Publikováno v:
Vaccines, Vol 10, Iss 4, p 569 (2022)
Three simple approaches to forecast the COVID-19 epidemic in Jordan were previously proposed by Hussein, et al.: a short-term forecast (STF) based on a linear forecast model with a learning database on the reported cases in the previous 5–40 days,
Externí odkaz:
https://doaj.org/article/72f2c3d759134c73a2544ffac0edaacc
Publikováno v:
Sensors, Vol 20, Iss 10, p 2876 (2020)
Sub-micron aerosols are a vital air pollutant to be measured because they pose health effects. These particles are quantified as particle number concentration (PN). However, PN measurements are not always available in air quality measurement stations
Externí odkaz:
https://doaj.org/article/59e437f846ba437199ee2f06d0d4cc3e
Publikováno v:
The International Arab Journal of Information Technology. 19
Intrusion Detection Systems (IDS) are one of the major research application problems in the computer security domain. With the increasing number of advanced network attacks, the improvement of the traditional IDS techniques become a challenge. Effici
Publikováno v:
Advances in Science, Technology and Engineering Systems Journal. 5:512-526
Autor:
Naser Hossein Motlagh, Martha A. Zaidan, Sami Serhan, Tareq Hussein, Rania M. Ghoniem, Mohammad AlKhanafseh, Pak Lun Fung, Ola Surakhi
Publikováno v:
Electronics, Vol 10, Iss 2518, p 2518 (2021)
Electronics
Volume 10
Issue 20
Electronics
Volume 10
Issue 20
The time-series forecasting is a vital area that motivates continuous investigate areas of intrigued for different applications. A critical step for the time-series forecasting is the right determination of the number of past observations (lags). Thi
In air quality research, often only particle mass concentrations as indicators of aerosol particles are considered. However, the mass concentrations do not provide sufficient information to convey the full story of fractionated size distribution, whi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::979987e68bd8c2284ed793630437ea4a
https://amt.copernicus.org/preprints/amt-2021-37/
https://amt.copernicus.org/preprints/amt-2021-37/
Publikováno v:
2019 2nd International Conference on new Trends in Computing Sciences (ICTCS).
Face recognition is a well-known biometric method that used in many applications for authentication and identification. The original face recognition scheme takes face image, extract its features and store it as a vector in the database. The saved ve
Publikováno v:
Advances in Science, Technology and Engineering Systems, Vol 3, Iss 3, Pp 116-124 (2018)
Face recognition is one of the most well-known biometric methods. It is a technique used for identifying individual from his face. The recognition process takes the face and compares it with the one stored in the database for recognizing it. Many met
Publikováno v:
Advances in Science, Technology and Engineering Systems, Vol 3, Iss 3, Pp 152-160 (2018)
Multicore processor combines two or more independent cores onto one integrated circuit. Although it offers a good performance in terms of the execution time, there are still many metrics such as number of cores, power, memory and more that effect on
Publikováno v:
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY. 16:7047-7064
Software provide services that may come with some vulnerabilities or risks. Attackers perform actions that break security of system through threats and cause a failure. To avoid security vulnerability, there are many security-specific concepts that s