Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Taher Al-Shehari"'
Autor:
Kogilavani Shanmugavadivel, Murali Dhar M S, Mahesh T R, Taher Al-Shehari, Nasser A. Alsadhan, Temesgen Engida Yimer
Publikováno v:
BMC Medical Informatics and Decision Making, Vol 24, Iss 1, Pp 1-22 (2024)
Abstract Polycystic Ovarian Disease or Polycystic Ovary Syndrome (PCOS) is becoming increasingly communal among women, owing to poor lifestyle choices. According to the research conducted by National Institutes of Health, it has been observe that PCO
Externí odkaz:
https://doaj.org/article/7558f3f149a948fb97e3e10a20dcbe40
Autor:
Taher Al-Shehari, Mohammed Kadrie, Taha Alfakih, Hussain Alsalman, T. Kuntavai, R. G. Vidhya, C. Dhanamjayulu, Shubhi Shukla, Baseem Khan
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-25 (2024)
Abstract The rise of Electric Vehicles (EVs) has introduced significant advancement and evolution in the electricity market. In smart transportation, the EVs have earned more popularity because of its numerous benefits including lower carbon footprin
Externí odkaz:
https://doaj.org/article/a0f298e7e6634528a8ea6cfe00692d82
Autor:
Anindya Nag, Hirak Mondal, Md Mehedi Hassan, Taher Al-Shehari, Mohammed Kadrie, Muna Al-Razgan, Taha Alfakih, Sujit Biswas, Anupam Kumar Bairagi
Publikováno v:
IEEE Access, Vol 12, Pp 103060-103081 (2024)
Diagnosing brain tumors using magnetic resonance imaging (MRI) presents significant challenges due to the complexities of segmentation and the variability in tumor characteristics. To address the limitations inherent in traditional methods, this rese
Externí odkaz:
https://doaj.org/article/6cb8c28f51a24f6a9a1beb0d099de334
Publikováno v:
IEEE Access, Vol 12, Pp 65942-65955 (2024)
Sentiment Analysis, a crucial tool for analyzing user opinions, has shown efficacy particularly when tailored to specific domains. While existing research predominantly focuses on training various classifiers for sentiment analysis within the softwar
Externí odkaz:
https://doaj.org/article/9090e4da66c046809e5c2a6a31ef4d83
Autor:
Shitharth Selvarajan, Hariprasath Manoharan, Celestine Iwendi, Taher Al-Shehari, Muna Al-Razgan, Taha Alfakih
Publikováno v:
Mathematical Biosciences and Engineering, Vol 20, Iss 12, Pp 20828-20851 (2023)
The security of the Internet of Things (IoT) is crucial in various application platforms, such as the smart city monitoring system, which encompasses comprehensive monitoring of various conditions. Therefore, this study conducts an analysis on the ut
Externí odkaz:
https://doaj.org/article/69b338b9ab6d4334aeed58fa9ffff6fa
Autor:
Naureen Zainab, Hammad Afzal, Taher Al-Shehari, Muna Al-Razgan, Naima Iltaf, Muhammad Zakria, Muhammad Javed Hyder, Raheel Nawaz
Publikováno v:
IEEE Access, Vol 11, Pp 127637-127650 (2023)
Citrus canker is among the major plant diseases caused by Xanthomonas citri which affects the quality and quantity of citrus fruit. This results in the reduction of citrus production which causes a huge financial loss and livelihood of the farming co
Externí odkaz:
https://doaj.org/article/0a40f73e916d42e69e4fdccf4c079bbe
Publikováno v:
IEEE Access, Vol 11, Pp 118170-118185 (2023)
Insider attacks may inflict far greater damage to an organization than outsider threats since insiders are authorized users who are acquainted with the business’s system, making detection harder. Many techniques to detecting insider threats have be
Externí odkaz:
https://doaj.org/article/f8bfb587c5964fcf856b85baa7d0e471
Autor:
Rakan A. Alsowail, Taher Al-Shehari
Publikováno v:
PeerJ Computer Science, Vol 8, p e938 (2022)
With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the confidentiality, integrity, and availability of their data from possible att
Externí odkaz:
https://doaj.org/article/45008e56e46b4ca48a19307fae40cb1a
Autor:
Rakan A. Alsowail, Taher Al-Shehari
Publikováno v:
IEEE Access, Vol 8, Pp 78385-78402 (2020)
Vital organizations have faced increasing challenges of how to defend against insider threats that may cause a severe damage to their assets. The nature of insider threats is more challenging than external threats, as insiders have a privileged acces
Externí odkaz:
https://doaj.org/article/6825bf5133974bc3b762b67817836d0c
Autor:
Taher Al-Shehari, Rakan A. Alsowail
Publikováno v:
Entropy, Vol 23, Iss 10, p 1258 (2021)
Insider threats are malicious acts that can be carried out by an authorized employee within an organization. Insider threats represent a major cybersecurity challenge for private and public organizations, as an insider attack can cause extensive dama
Externí odkaz:
https://doaj.org/article/1857cc0bca434a7f9846e3b92047e918