Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Subhi R.M. Zeebaree"'
Publikováno v:
Applied Computer Science, Vol 20, Iss 2 (2024)
The sixth-generation (6G) communication technology has potential in various applications, for instance, industrial automation, intelligent transportation, healthcare systems, and energy consumption prediction. On the other hand, the concerns of priva
Externí odkaz:
https://doaj.org/article/1347111b85154a41a79645298d6ea916
Publikováno v:
Data in Brief, Vol 49, Iss , Pp 109455- (2023)
This article presents the created dataset obtained from implementation of a proposed distributed energy management system based on the Internet of Things (IoT). The proposed approach was implemented and evaluated at two distinct institutions, namely
Externí odkaz:
https://doaj.org/article/fec94165de034947a26c8c42762c6bb4
Publikováno v:
PeerJ Computer Science, Vol 8, p e937 (2022)
Increasing demands for information and the rapid growth of big data have dramatically increased the amount of textual data. In order to obtain useful text information, the classification of texts is considered an imperative task. Accordingly, this ar
Externí odkaz:
https://doaj.org/article/ccc5bdfae81a4839b88c60058de337b8
Publikováno v:
Science Journal of University of Zakho, Vol 7, Iss 1, Pp 27-32 (2019)
In the last two decades, steganalysis has become a fertile research area to minimize the security risks left behind by Misuse of data concealment in digital computer files. As the propagation of hidden writing increased, the need for the steganalysis
Externí odkaz:
https://doaj.org/article/b45b5197b61d40bb952f57fe7716fdf2
Publikováno v:
Science Journal of University of Zakho, Vol 6, Iss 3, Pp 118-123 (2018)
Through the huge growth of heavy computing applications which require a high level of performance, it is observed that the interest of monitoring operating system performance has also demanded to be grown widely. In the past several years since OS pe
Externí odkaz:
https://doaj.org/article/226590b5044a4294ae5b7ce9ca32d7e1
Publikováno v:
Science Journal of University of Zakho, Vol 7, Iss 2 (2019)
This paper presents a comparative study of two designs and analysis: Two Tier Architecture (2TA) and Three Tier Architecture (3TA). By using Optimized Network Engineering Tool (OPNET) modeler network-efficiency is done evaluation. OPNET, a profession
Externí odkaz:
https://doaj.org/article/24dea44d2dc24230860bc9b9ead6773d
Autor:
Firas Abedi, Subhi R.M. Zeebaree, Zainab Salih Ageed, Hayder M.A. Ghanimi, Ahmed Alkhayyat, Mohammed A.M. Sadeeq, Sarmad Nozad Mahmood, Ali S. Abosinnee, Zahraa H. Kareem, Ali Hashim Abbas, Waleed Khaild Al-Azzawi, Mustafa Musa Jaber, Mohammed Dauwed
Publikováno v:
Computers, Materials & Continua. 74:5691-5704
Publikováno v:
PeerJ. Computer science. 8
Increasing demands for information and the rapid growth of big data have dramatically increased the amount of textual data. In order to obtain useful text information, the classification of texts is considered an imperative task. Accordingly, this ar
Publikováno v:
Science Journal of University of Zakho, Vol 7, Iss 1, Pp 27-32 (2019)
In the last two decades, steganalysis has become a fertile research area to minimize the security risks left behind by Misuse of data concealment in digital computer files. As the propagation of hidden writing increased, the need for the steganalysis