Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Sami Albouq"'
Autor:
Sadia Saif, Hamayun Khan, Arshad Ali, Sami Albouq, Muhammad Zunnurain Hussain, Muhammad Zulkifl Hasan, Irfan Uddin, Shahab Khan, Mohammad Husain
Publikováno v:
Journal of Mechanics of Continua and Mathematical Sciences, Vol 19, Iss 8, Pp 191-206 (2024)
The dangers that Internet of Things (IoT) devices pose to large corporate corporations and smart districts have been dissected by several academics. Given the ubiquitous use of IoT and its unique characteristics, such as mobility and normalization re
Externí odkaz:
https://doaj.org/article/fe803d49ac2b49bc9f485427dfac2b7a
Autor:
Qaiser Abbas, Tahir Alyas, Turki Alghamdi, Ahmad B. Alkhodre, Sami Albouq, Mushtaq Niazi, Nadia Tabassum
Publikováno v:
Frontiers in Big Data, Vol 7 (2024)
With the rapid growth of information and communication technologies, governments worldwide are embracing digital transformation to enhance service delivery and governance practices. In the rapidly evolving landscape of information technology (IT), se
Externí odkaz:
https://doaj.org/article/f1807c335ee847d5aa17cd55f62858a8
Publikováno v:
Applied Sciences, Vol 12, Iss 20, p 10559 (2022)
Long unpunctuated texts containing complex linguistic sentences are a stumbling block to processing any low-resource languages. Thus, approaches that attempt to segment lengthy texts with no proper punctuation into simple candidate sentences are a vi
Externí odkaz:
https://doaj.org/article/52ec0f27d3944b98b183c21920bdd021
Publikováno v:
International Journal of Advanced Computer Science and Applications. 14
Publikováno v:
International Journal of Advanced Computer Science and Applications. 10
The world has witnessed an information explosion in the past two decades. Electronic devices are now available in many varieties such as PCs, Laptops, book readers, mobile devices and with relatively affordable prices. This and the ubiquitous use of
Publikováno v:
Transactions on Machine Learning and Artificial Intelligence. 3
Anti-malware software traditionally employ methods of signature-based and heuristic-based detection. These detection systems need to be manually updated with new behaviors to detect new, unknown, or adapted malware. Our goal is to create a new malwar
Autor:
Fakhar, Muhammad Hanfia, Baig, Muhammad Zeeshan, Ali, Arshad, Afzal Rana, Muhammad Tausif, Khan, Hamayun, Afzal, Waseem, Farooq, Hafiz Umar, Albouq, Sami
Publikováno v:
Engineering, Technology & Applied Science Research; Oct2024, Vol. 14 Issue 5, p17501-17506, 6p
Autor:
Abbas, Qaiser, Alyas, Tahir, Alghamdi, Turki, Alkhodre, Ahmad B., Albouq, Sami, Niazi, Mushtaq, Tabassum, Nadia
Publikováno v:
Frontiers in Big Data; 2024, p01-15, 15p
Publikováno v:
Applied Sciences (2076-3417); Oct2022, Vol. 12 Issue 20, pN.PAG-N.PAG, 15p
Autor:
Javier Prieto, Francisco Luis Benítez Martínez, Stefano Ferretti, David Arroyo Guardeño, Pedro Tomás Nevado-Batalla
This book constitutes the refereed proceedings of the 4th International Congress on Blockchain and Applications 2022, BLOCKCHAIN'22, held in L'Aquila, Italy, in July 2022. Among the scientific community, blockchain and artificial intelligence are a p