132 results on '"Alghazzawi, Daniyal"'
Search Results
2. Evolutionary Computation in bioinformatics: A survey
3. Optimal solution of fractional differential equations in solving the relief of college students’ mental obstacles
4. Visualized calculation of regional power grid power data based on multiple linear regression equation
5. The evaluation of college students’ innovation and entrepreneurship ability based on nonlinear model
6. Mathematical function data model analysis and synthesis system based on short-term human movement
7. Optimisation of Modelling of Finite Element Differential Equations with Modern Art Design Theory
8. Developing an Accreditation Process for a Computing Faculty with Focus on the IS Program
9. Detection of GPS Spoofing Attacks in UAVs Based on Adversarial Machine Learning Model.
10. UAV assistance paradigm: State-of-the-art in applications and challenges
11. Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research
12. Interactivity Technologies to Improve the Learning in Classrooms through the Cloud
13. Predicting miRNA-disease association from heterogeneous information network with GraRep embedding model
14. Enhancing Industrial Wireless Communication Security Using Deep Learning Architecture-Based Channel Frequency Response.
15. Applying the information search process model to analyze aspects in the design of serious games for children with hearing impairment
16. An interval type-2 fuzzy logic based framework for reputation management in Peer-to-Peer e-commerce
17. Generative Adversarial Network-Based Data Augmentation for Enhancing Wireless Physical Layer Authentication.
18. Modeling and predicting execution time of scientific workflows in the Grid using radial basis function neural network
19. MoNGEL: monotonic nested generalized exemplar learning
20. A type-2 fuzzy logic recommendation system for adaptive teaching
21. Centralizing Students Curriculums to the Professional Work
22. A security model for smart grid SCADA systems using stochastic neural network.
23. Network Learning-Enabled Sensor Association for Massive Internet of Things.
24. BIoMT: A Blockchain-Enabled Healthcare Architecture for Information Security in the Internet of Medical Things.
25. Enhancing Cyber Security Governance and Policy for SMEs in Industry 5.0: A Comparative Study between Saudi Arabia and the United Kingdom.
26. Deep Learning Architecture for Detecting SQL Injection Attacks Based on RNN Autoencoder Model.
27. A cloud computing based many objective type-2 fuzzy logic system for mobile field workforce area optimization
28. A cloud computing based Big-Bang Big-Crunch fuzzy logic multi classifier system for Soccer video scenes classification
29. ERF-XGB: Ensemble Random Forest-Based XG Boost for Accurate Prediction and Classification of E-Commerce Product Review.
30. A fuzzy logic-based system for the automation of human behavior recognition using machine vision in intelligent environments
31. Monitoring Students Moods for the Detection of Weaknesses in Secondary Schools
32. Looking for Leaders: Reaching the Future Leaders in Education through Online Social Networks
33. Education System in the Cloud to Improve Student Communication in the Institutes of: C-LearniXML++
34. An Efficient and Secure Model Using Adaptive Optimal Deep Learning for Task Scheduling in Cloud Computing.
35. Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review.
36. Integrating Blockchain with Artificial Intelligence to Secure IoT Networks: Future Trends.
37. Towards a linear general type-2 fuzzy logic based approach for computing with words
38. Explainable AI-based suicidal and non-suicidal ideations detection from social media text with enhanced ensemble technique
39. Adversarial attacks against supervised machine learning based network intrusion detection systems.
40. Ontology-Based Linked Data to Support Decision-Making within Universities.
41. Epileptic Disorder Detection of Seizures Using EEG Signals.
42. Framework for Malware Triggering Using Steganography.
43. Optimized Generative Adversarial Networks for Adversarial Sample Generation.
44. An Improved Optimized Model for Invisible Backdoor Attack Creation Using Steganography.
45. Improved Energy Based Multi-Sensor Object Detection in Wireless Sensor Networks.
46. Modified SHARK Cipher and Duffing Map-Based Cryptosystem.
47. Distance Matrix and Markov Chain Based Sensor Localization in WSN.
48. A Reinforcement Learning-Based Framework for Crowdsourcing in Massive Health Care Internet of Things.
49. Using the B/S Model to Design and Implement Online Shopping System for Gulf Brands.
50. SECURITY APPLICATION OF NEURAL NETWORKS UNDER THE INSPECTION OF NONLINEAR DYNAMIC SYSTEMS.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.