Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Sura I. Mohammed Ali"'
Publikováno v:
Egyptian Informatics Journal, Vol 23, Iss 2, Pp 187-196 (2022)
Blockchain stores a series of transactions in form of a sequence of linked blocks. Hence, the concept of a single decentralized ledger is easily maintained. Transactions and interactions that take place among the participants accessing the distribute
Externí odkaz:
https://doaj.org/article/6dbe16ca1aa642498517999e1cb32421
Publikováno v:
AIP Conference Proceedings.
Autor:
Rafid Habib Buti, Sura I. Mohammed Ali
Publikováno v:
MINAR International Journal of Applied Sciences and Technology. :87-91
Disease detection is one of the applications where data mining techniques achieved more accurate and useful results. The healthcare sector collects massive volumes of healthcare data that are not mine to discover hidden data for better decision-makin
Autor:
Sura I. Mohammed Ali
Publikováno v:
Turkish Journal of Computer and Mathematics Education (TURCOMAT). 12:3305-3312
lockchain stores a series of transactions in form of a sequence of linked blocks. Hence, the concept of ledger is easily maintained. Transactions and interactions that take place among participants accessing the distributed and decentralized blockcha
Publikováno v:
Muthanna Journal of Pure Science. 8:120-131
"Recommended systems, also known as systems of recommendation, are a part of information filtration systems which are utilized to predict the user’s estimation or choice for an object. In recent years, recommended systems have been extensively used
Autor:
Marwah Nihad, Sura I. Mohammed Ali
Publikováno v:
Journal of Physics: Conference Series. 1897:012076
Tracking student attendance and location information are at the heart of a pervasive internet thing. Several approaches are used to identify student locations in the classroom, Infrastructure and increased services are considered expensive requiremen
Publikováno v:
Periodicals of Engineering and Natural Sciences (PEN). 7:1405
Steganography is one of the secure techniques of protecting data inside a cover object. Images are the most popular cover objects for Steganography. It provides secret message between users. The current paper presents an enhanced Most Significant Bit