-
21
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
منشور في 2011"…The research is concluded with a conclusion section which recapitulates the results obtained and observations with regards to the current detection mechanisms and the applied machine learning algorithms. …"
احصل على النص الكامل
-
22
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…There are a variety of ways in which AI technology can aid in the growth and profitability of a variety of industries. …"
احصل على النص الكامل
احصل على النص الكامل
-
23
Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic
منشور في 2020"…These types of fears are connected with two important factors within TAM theory, which are: perceived ease of use (PEOU) and perceived usefulness (PU), and with another external factor of TAM, which is subjective norm (SN). …"
احصل على النص الكامل
احصل على النص الكامل
-
24
Optimizing Energy Consumption In Cloud Datacenters
منشور في 2024احصل على النص الكامل
doctoralThesis -
25
-
26
Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning
منشور في 2023"…The main issue which arises in LoRaWAN is because of its high packet drop rate due to collision. …"
-
27
Minimum UAV fog servers with maximum IoT devices association using genetic algorithms
منشور في 2021"…Internet of Things (IoT) has emerged as a new technology to enhance many services and applications including the industrial sector; thus, enabling the Industry 4.0 among many others. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
28
Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands
منشور في 2020"…The high growth of the automotive industry reveals the very bright future of this technology and its high penetration effects on the human society. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
29
Optimisation of PV Cleaning Practices: Comparison Between Performance Based and Periodic Based Approaches
منشور في 2018"…The cases simulated were 12 different PV setups which included 6 different PV technologies on a 5 and 25 degree tilt: 1. …"
احصل على النص الكامل
-
30
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل
-
31
Improved Jaya Synergistic Swarm Optimization Algorithm to Optimize Task Scheduling Problems in Cloud Computing
منشور في 2024"…Cloud computing has emerged as a cornerstone technology for modern computational paradigms due to its scalability and flexibility. …"
احصل على النص الكامل
-
32
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
منشور في 2024"…<p dir="ltr">The most important and difficult challenge the digital society has recently faced is ensuring data privacy and security in cloud‐based Internet of Things (IoT) technologies. As a result, many researchers believe that the blockchain's Distributed Ledger Technology (DLT) is a good choice for various clever applications. …"
-
33
-
34
A Prioritized Uplink Call Admission Control Algorithm for 3G WCDMA Cellular Systems with Multi-Services
منشور في 2005"…The 3G cellular mobile systems which are based on WCDMA technology are expected to be interference limited. …"
احصل على النص الكامل
احصل على النص الكامل
article -
35
Classifying Maqams of Qur'anic Recitations Using Deep Learning
منشور في 2021"…However, it is more difficult for students to learn this art compared to other techniques of Qur’anic recitation such as Tajwid due to limited resources. Technological advancement can be utilized for automatic classification of these melodies which can then be used by students for self-learning. …"
احصل على النص الكامل
article -
36
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …"
-
37
Optimal Management of Mobile Energy Generation and Storage Systems
منشور في 2018احصل على النص الكامل
doctoralThesis -
38
-
39
-
40
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
منشور في 2017احصل على النص الكامل
doctoralThesis