Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Yasir Abdelgadir Mohamed"'
Publikováno v:
IEEE Access, Vol 12, Pp 59289-59317 (2024)
In the wake of the expanding digital realm, the imperative for robust cybersecurity measures has burgeoned significantly. This extensive investigation digs into the complicated realm of cybersecurity datasets, with the goal of improving our understan
Externí odkaz:
https://doaj.org/article/3d1a1773d9304de0b928e00c793a6a6e
Autor:
Yasir Abdelgadir Mohamed, Akbar Khanan, Mohamed Bashir, Abdul Hakim H. M. Mohamed, Mousab A. E. Adiel, Muawia A. Elsadig
Publikováno v:
IEEE Access, Vol 12, Pp 25553-25579 (2024)
In the context of a more linked and globalized society, the significance of proficient cross-cultural communication has been increasing to a position of utmost importance. Language functions as a crucial medium that establishes connections among peop
Externí odkaz:
https://doaj.org/article/735e59a6d0b84de89a89e66d149565fa
Autor:
Yasir Abdelgadir Mohamed, Akbar Khanan, Mohamed Bashir, Abdul Hakim H. M. Mohamed, Mousab A. E. Adiel, Muawia A. Elsadig
Publikováno v:
IEEE Access, Vol 12, Pp 118923-118923 (2024)
Presents corrections to the paper, The Impact of Artificial Intelligence on Language Translation: A Review.
Externí odkaz:
https://doaj.org/article/109bbbc5679845b5a5f569642e9a263d
Publikováno v:
Journal of Engineering Science and Technology, Vol 4, Iss 2, Pp 231-242 (2009)
Be short of well-defined networks boundaries, shared medium, collaborative services, and dynamic nature, all are representing some of the key characteristics that distinguish mobile ad hoc networks from the conventional ones. Besides, each node is a
Externí odkaz:
https://doaj.org/article/9cfa90dcca2040aaa7f85864176cb2fd
Publikováno v:
International Conference on Information Systems and Intelligent Applications ISBN: 9783031168642
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f81e41a7215dc38fb43d0a82c4e4c554
https://doi.org/10.1007/978-3-031-16865-9_50
https://doi.org/10.1007/978-3-031-16865-9_50
Publikováno v:
2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE).
For most of us, Internet services have become an almost daily activity and an integral part of our lives, and these services come with many requirements regarding protection, including advanced authentication, which is usually dealt with or neglected
Publikováno v:
2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE).
The great development of information and communication technology has leads to use of networks to connecting the world. The intranet is defined as private network that can only be accessed by authorized users for internal communications. The aim of t
Publikováno v:
2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE).
although a lot of effort has been made and a lot of studies about network security have been carried out, the security requirements for different type of network are increasing daily because of the huge amount of malware and hacking mechanisms are de
Publikováno v:
2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE).
The Data Encryption Standard (DES) algorithm has been considered as the most popular symmetric key, blocks ciphering cryptographic. Even though the DES algorithm had still been used in some applications, it was considered unsafe because of the short
Publikováno v:
AIP Conference Proceedings.
This paper extends the work that has earlier been established. Immune inspired approach for securing mobile ad hoc networks is specified there. Although it is clearly indicated there that the research scope is the wireless networks in general and hyb