Search

Your search keyword '"Alghazzawi, Daniyal"' showing total 132 results

Search Constraints

Start Over You searched for: Author "Alghazzawi, Daniyal" Remove constraint Author: "Alghazzawi, Daniyal" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
132 results on '"Alghazzawi, Daniyal"'

Search Results

3. Optimal solution of fractional differential equations in solving the relief of college students’ mental obstacles

4. Visualized calculation of regional power grid power data based on multiple linear regression equation

5. The evaluation of college students’ innovation and entrepreneurship ability based on nonlinear model

6. Mathematical function data model analysis and synthesis system based on short-term human movement

7. Optimisation of Modelling of Finite Element Differential Equations with Modern Art Design Theory

8. Developing an Accreditation Process for a Computing Faculty with Focus on the IS Program

9. Detection of GPS Spoofing Attacks in UAVs Based on Adversarial Machine Learning Model.

12. Interactivity Technologies to Improve the Learning in Classrooms through the Cloud

14. Enhancing Industrial Wireless Communication Security Using Deep Learning Architecture-Based Channel Frequency Response.

17. Generative Adversarial Network-Based Data Augmentation for Enhancing Wireless Physical Layer Authentication.

22. A security model for smart grid SCADA systems using stochastic neural network.

23. Network Learning-Enabled Sensor Association for Massive Internet of Things.

24. BIoMT: A Blockchain-Enabled Healthcare Architecture for Information Security in the Internet of Medical Things.

25. Enhancing Cyber Security Governance and Policy for SMEs in Industry 5.0: A Comparative Study between Saudi Arabia and the United Kingdom.

26. Deep Learning Architecture for Detecting SQL Injection Attacks Based on RNN Autoencoder Model.

29. ERF-XGB: Ensemble Random Forest-Based XG Boost for Accurate Prediction and Classification of E-Commerce Product Review.

34. An Efficient and Secure Model Using Adaptive Optimal Deep Learning for Task Scheduling in Cloud Computing.

35. Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review.

36. Integrating Blockchain with Artificial Intelligence to Secure IoT Networks: Future Trends.

39. Adversarial attacks against supervised machine learning based network intrusion detection systems.

40. Ontology-Based Linked Data to Support Decision-Making within Universities.

41. Epileptic Disorder Detection of Seizures Using EEG Signals.

42. Framework for Malware Triggering Using Steganography.

43. Optimized Generative Adversarial Networks for Adversarial Sample Generation.

44. An Improved Optimized Model for Invisible Backdoor Attack Creation Using Steganography.

45. Improved Energy Based Multi-Sensor Object Detection in Wireless Sensor Networks.

46. Modified SHARK Cipher and Duffing Map-Based Cryptosystem.

47. Distance Matrix and Markov Chain Based Sensor Localization in WSN.

49. Using the B/S Model to Design and Implement Online Shopping System for Gulf Brands.

50. SECURITY APPLICATION OF NEURAL NETWORKS UNDER THE INSPECTION OF NONLINEAR DYNAMIC SYSTEMS.

Catalog

Books, media, physical & digital resources