Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Tarik Zeyad Ismaeel"'
Publikováno v:
Journal of Engineering, Vol 18, Iss 11 (2023)
Internet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet
Externí odkaz:
https://doaj.org/article/e59f45a9994d4924876729d1948a1897
Publikováno v:
Journal of Engineering, Vol 22, Iss 7, Pp 142-163 (2016)
Ad-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks ar
Externí odkaz:
https://doaj.org/article/daf21a7462bf4d66812962a8dcf43973
Autor:
Tarik Zeyad Ismaeel
Publikováno v:
Engineering and Technology Journal, Vol 31, Iss 7A, Pp 1418-1430 (2013)
In this paper, an automatic speaker–independent Arabic word speech recognition system is presented using 3D Radon and Multiwavelet neural network. The approach contains combining multiwavelet theory to neural network which lead to fabricate a Multi
Externí odkaz:
https://doaj.org/article/78dae5cff6de4078bfcaba01bd9c6d65
Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implement
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::036dc9a67ceeb606ac53dbcd48d314c2
https://zenodo.org/record/7961555
https://zenodo.org/record/7961555
Publikováno v:
Indonesian Journal of Electrical Engineering and Computer Science. 28:1697
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique ut
Autor:
Tarik Zeyad Ismaeel, Bashar M. Mansoor
Publikováno v:
Journal of Communications. :88-96
Autor:
Tarik Zeyad Ismaeel, Ahmed Saad Names
Publikováno v:
International Journal of Computer Applications. 132:31-36
Data encryption has become more important in the world of information, in order to secure the information during communicating or transmitting and to prevent an illegal person from achieving on the sensitive information. In this paper, fingerprint en
Publikováno v:
International Journal of Computer Applications. 77:32-39
Sensor Networks (WSNs) consists of a huge number of tiny, low-priced, and battery-powered devices with limited on board sensing, processing and communication capabilities. The batteries of sensor nodes of WSNs are usually with limited capacity; hence
Publikováno v:
International Journal of Computer Applications. 72:23-32
Face recognition is a complex visual classification task which plays an important role in computer vision, image processing, and pattern recognition. SMWT is proposed to extract the features in images before using the PCA and histogram based method c
Publikováno v:
2012 International Conference on Future Communication Networks.
In this paper, new approaches are used to detect the occurrence of shadow fading using multiwavelets and slantlet transforms to decompose the signal strength trace and observe the presence or absence of shadow fading by measuring the variations in th