Zobrazeno 1 - 10
of 40
pro vyhledávání: '"Rafik, Hamza"'
Autor:
Rafik Hamza, Dao Minh-Son
Publikováno v:
Virtual Reality & Intelligent Hardware, Vol 4, Iss 3, Pp 210-222 (2022)
Augmented reality (AR) technologies enable people to observe the world in new ways. Generally, AR uses computer-generated graphics to overlay improvements on the user's perspective of reality using big data and machine learning techniques. In this pa
Externí odkaz:
https://doaj.org/article/6398a4baef5a430e87caf8f5760ce3a7
Autor:
Alzubair Hassan, Rafik Hamza, Fagen Li, Awad Ali, Mohammed Bakri Bashir, Samar M. Alqhtani, Tawfeeg Mohmmed Tawfeeg, Adil Yousif
Publikováno v:
IEEE Access, Vol 10, Pp 69757-69770 (2022)
Mobile devices have become very important for our daily needs. The user authentication protocols with the key agreement are required to deal with the security issues that arise from the use of mobile devices through Internet applications. However, ex
Externí odkaz:
https://doaj.org/article/ab0a8a4c4fdd44e8ac7de44445d50f28
Autor:
Tawfeeg Mohmmed Tawfeeg, Adil Yousif, Alzubair Hassan, Samar M. Alqhtani, Rafik Hamza, Mohammed Bakri Bashir, Awad Ali
Publikováno v:
IEEE Access, Vol 10, Pp 71853-71873 (2022)
The computational cloud aims to move traditional computing from personal computers to cloud providers on the internet. Cloud security represents an important research area. Confidentiality, integrity, and availability are the main cloud security char
Externí odkaz:
https://doaj.org/article/71e8a40f8a1945cfb1ef11befbe8c866
Publikováno v:
ITM Web of Conferences, Vol 52, p 01006 (2023)
Current health situations and crises require physicians and researchers to convert traditional healthcare services to a new generation of digital healthcare known as e-health smart systems that operate close to the end user with the objective to prov
Externí odkaz:
https://doaj.org/article/d3adb7ffe45c4ab69377327a50e81aec
Autor:
Rafik Hamza, Hilmil Pradana
Publikováno v:
Algorithms, Vol 15, Iss 11, p 418 (2022)
Big Data applications have the potential to transform any digital business platform by enabling the analysis of vast amounts of data. However, the biggest problem with Big Data is breaking down the intellectual property barriers to using that data, e
Externí odkaz:
https://doaj.org/article/e848e4a1f2874485b7744d6f4bc81b25
Publikováno v:
International Journal of Safety & Security Engineering; Jun2024, Vol. 14 Issue 3, p815-829, 15p
Publikováno v:
IEEE Access, Vol 7, Pp 86384-86393 (2019)
Electronic health records (EHRs) replaced the old paper-based systems to make patient data more accurate, reliable, and more accessible. Yet, the EHRs system requires high transmission cost, energy, and waste of time for both doctors and patients. Fu
Externí odkaz:
https://doaj.org/article/325eaa6a91354ef0b66f2e9e5452adcc
Publikováno v:
IEEE Access, Vol 7, Pp 146322-146330 (2019)
Cloud computing has been widely applied in numerous applications for storage and data analytics tasks. However, cloud servers engaged through a third party cannot be fully trusted by multiple data users. Thus, security and privacy concerns become the
Externí odkaz:
https://doaj.org/article/0c9bc595481b41f5a564650280479e09
Autor:
Awad Ali, Mohammed Bakri Bashir, Alzubair Hassan, Rafik Hamza, Samar M. Alqhtani, Tawfeeg Mohmmed Tawfeeg, Adil Yousif
Publikováno v:
Sensors, Vol 22, Iss 7, p 2812 (2022)
Software reliability is prioritised as the most critical quality attribute. Reliability prediction models participate in the prevention of software failures which can cause vital events and disastrous consequences in safety-critical applications or e
Externí odkaz:
https://doaj.org/article/645e86dc1ea74f7eaff83f7b71c94d8d
Autor:
Rafik Hamza, Alzubair Hassan, Awad Ali, Mohammed Bakri Bashir, Samar M. Alqhtani, Tawfeeg Mohmmed Tawfeeg, Adil Yousif
Publikováno v:
Entropy, Vol 24, Iss 4, p 519 (2022)
Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without f
Externí odkaz:
https://doaj.org/article/81b3f867bef940e4b1e7d58e0871c9f7