Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Shayem Saleh"'
Autor:
Abdulaziz Fatani, Abdelghani Dahou, Mohamed Abd Elaziz, Mohammed A. A. Al-qaness, Songfeng Lu, Saad Ali Alfadhli, Shayem Saleh Alresheedi
Publikováno v:
Sensors, Vol 23, Iss 9, p 4430 (2023)
Intrusion detection systems (IDS) play a crucial role in securing networks and identifying malicious activity. This is a critical problem in cyber security. In recent years, metaheuristic optimization algorithms and deep learning techniques have been
Externí odkaz:
https://doaj.org/article/4d59ec57dc1247fd99ac7291130c8109
Publikováno v:
Investment Management & Financial Innovations, Vol 16, Iss 1, Pp 128-143 (2019)
Most of the GCC countries currencies are pegged to the US dollar, which make the economy those countries susceptible to the US monetary policy change. This paper used the non-structural VAR tests to examine the spillovers impact of the two recently d
Externí odkaz:
https://doaj.org/article/e5bb147e02644fab965b952574c4a3bd
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Investment Management & Financial Innovations, Vol 16, Iss 1, Pp 128-143 (2019)
Most of the GCC countries currencies are pegged to the US dollar, which make the economy those countries susceptible to the US monetary policy change. This paper used the non-structural VAR tests to examine the spillovers impact of the two recently d
Publikováno v:
ECONOMICS, Vol 6, Iss 2, Pp 9-26 (2018)
Summary This paper analyzes the economic impact of the oil prices, the domestic resource gaps, and the fiscal and external breakeven oil prices on the oil exporting countries (OECs). Specifically, this paper aims to examine the empirical behaviors of
Autor:
Zaid Ameen Abduljabbar, Guangzhi Ma, Ismail Yaqub Maolood, Mudhafar Jalil Jassim Ghrabat, Shayem Saleh Alresheedi
Publikováno v:
Human-Centric Computing and Information Sciences, Vol 9, Iss 1, Pp 1-29 (2019)
Image retrieval is the process of retrieving images from a database. Certain algorithms have been used for traditional image retrieval. However, such retrieval involves certain limitations, such as manual image annotation, ineffective feature extract
Publikováno v:
Human-Centric Computing and Information Sciences, Vol 9, Iss 1, Pp 1-24 (2019)
In data center companies, cloud computing can host multiple types of heterogeneous virtual machines (VMs) and provide many features, including flexibility, security, support, and even better maintenance than traditional centers. However, some issues
Publikováno v:
Proceedings of the 2019 The World Symposium on Software Engineering - WSSE 2019.
Vehicular ad-hoc networks (VANETs) have got a wide range of attention to improve traffic systems and smart cities. Security and privacy are critical issues and need to be addressed for effective VANET systems. In this paper, we propose an efficient c
Autor:
Songfeng Lu, Yahya E. A. Al-Salhi, Shayem Saleh Alresheedi, Mahmut Ince, Tong Li, Ismail Yaqub Maolood
Publikováno v:
2018 IEEE 4th International Conference on Computer and Communications (ICCC).
Fuzzy C-means thresholding with a Gaussian filter based on edge-detection technique is proposed to segment the cluster-edge-detection boundary in brain magnetic resonance imaging (MRI). With an MRI scan as an input image, fuzzy c-means (FCM) clusteri
Publikováno v:
IOP Conference Series: Materials Science and Engineering. 1077:012049
We present an adaptive threshold method for salt and pepper noisy fingerprint images. At first, we applied a threshold algorithm to detect noisy and corrupt pixels. Fingerprint image optimized with window filter produced pixels values. We measured th