Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Saleh Atiewi"'
Publikováno v:
PeerJ Computer Science, Vol 10, p e2337 (2024)
Data imputation strategies are necessary to address the prevalent difficulty of missing values in data observation and recording operations. This work utilizes diverse imputation methods to forecast and complete absent values inside a financial time-
Externí odkaz:
https://doaj.org/article/f582e58166a24d69b5c816f6349a3a5f
Autor:
Saleh Atiewi, Amer Al-Rahayfeh, Muder Almiani, Salman Yussof, Omar Alfandi, Ahed Abugabah, Yaser Jararweh
Publikováno v:
IEEE Access, Vol 8, Pp 113498-113511 (2020)
Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an effective approach to storing and managing the enorm
Externí odkaz:
https://doaj.org/article/92647e4971c14d41b1823c13191d0840
Publikováno v:
Future Internet, Vol 11, Iss 5, p 109 (2019)
Cloud computing (CC) is fast-growing and frequently adopted in information technology (IT) environments due to the benefits it offers. Task scheduling and load balancing are amongst the hot topics in the realm of CC. To overcome the shortcomings of t
Externí odkaz:
https://doaj.org/article/675a0bce4dd3461987de7d390a0a3969
Improvements in medical imaging have accelerated the rise of computerized healthcare. Namely, Magnetic Resource Imaging (MRI) has been shown to be a reliable method for detecting Mild Cognitive Impairment (MCI), the prenominal stage of Alzheimer's Di
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0ae25eb19eb124bad4eaf74a1d2408f1
https://doi.org/10.21203/rs.3.rs-2854479/v1
https://doi.org/10.21203/rs.3.rs-2854479/v1
Publikováno v:
Computers, Materials & Continua. 72:5443-5458
Publikováno v:
International Journal of Electrical and Computer Engineering (IJECE). 13:1708
At present, security is significant for individuals and organizations. All information need security to prevent theft, leakage, alteration. Security must be guaranteed by applying some or combining cryptography algorithms to the information. Encipher
Autor:
Omar Alfandi, Muder Almiani, Salman Yussof, Ahed Abugabah, Saleh Atiewi, Amer Al-Rahayfeh, Yaser Jararweh
Publikováno v:
IEEE Access, Vol 8, Pp 113498-113511 (2020)
Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an effective approach to storing and managing the enorm
Autor:
SALEH ATIEWI
Publikováno v:
International Journal of Recent Technology and Engineering. 8:395-405
Security plays a critical position in preserving information privacy and secrecy. Many encryption strategies are available to protect data during transmission or storage. These encryption methods vary in terms of strength, speed, and resource consump
There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twitter, Skype, etc), calling (mobile phone) and voice recording (record your voice and then send it to the other party), but there are ways to eavesdrop
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2659::ea13b43d253d2fe32a6260b91df6fff0
https://zenodo.org/record/4133038
https://zenodo.org/record/4133038
Autor:
Saleh Atiewi, Muder Almiani, Basel Magableh, Shen Ziqi, Ge Yaqin, Ayman Al-Dmour, Abdul Razaque, Mohammed Alweshah
Publikováno v:
SDS
Conference papers
Conference papers
Android systems have been successfully developed to meet the demands of users. The following four methods are used in Android systems for memory management: backing swap, CompCache, traditional Linux swap, and low memory killer. These memory manageme