106 results on '"Ahmed A. Al-Absi"'
Search Results
2. Comparison between DSRC and other Short Range Wireless Communication Technologies.
3. Classify and Analyze the Security Issues and Challenges in Mobile banking in Uzbekistan.
4. Analysis and Protection of Computer Network Security Issues.
5. Conservation Genetic Algorithm to Solve the E-commerce Environment Logistics Distribution Path Optimization Problem.
6. Deep Learning-Based Drone Classification Using Radar Cross Section Signatures at mmWave Frequencies.
7. A Multiple-Loss Dual-Output Convolutional Neural Network for Fashion Class Classification.
8. A Supervised Machine Learning Approach using Different Feature Selection Techniques on Voice Datasets for Prediction of Parkinson's Disease.
9. Digital Story-Telling: A Methodology of Web Based Learning of Teaching of Folklore Studies.
10. Security Challenge and Issue of Mobile Banking in Republic of Uzbekistan: A State of Art Survey.
11. A Conservation Genetic Algorithm for Optimization of the E-commerce Logistics Distribution Path.
12. Prediction of Quality for Different Type of Wine based on Different Feature Sets Using Supervised Machine Learning Techniques.
13. Multi-Factor Authentication in Cyber Physical System: A State of Art Survey.
14. Varied density of vehicles under city, highway and rural environments in V2V communication.
15. Modified Uncertainty Error Aware Estimation Model for Tracking the Path of Unmanned Aerial Vehicles
16. Performance Analysis for City, Highway, and Rural Area in Vehicle-to-Vehicle Network.
17. Obstacles effects on signal attenuation in line of sight for different environments in V2V communication.
18. A classification approach with different feature sets to predict the quality of different types of wine using machine learning techniques.
19. A nonlinear decision tree based classification approach to predict the Parkinson's disease using different feature sets of voice data.
20. A Novel Throughput and Collision for City Environment in V2V Communication.
21. A Review on Planted (l, d) Motif Discovery Algorithms for Medical Diagnose.
22. V2V communication modeling for environmental channel throughput and radio propagation.
23. Sentiment Analysis and Classification Using Deep Semantic Information and Contextual Knowledge
24. Secure and Efficient High Throughput Medium Access Control for Vehicular Ad-Hoc Network
25. A Novel Parallel Computation Model with Efficient Local Memory Management for Data-Intensive Applications.
26. Channel Allocation for Connected Vehicles in Internet of Things Services.
27. An environmental channel throughput and radio propagation modeling for vehicle-to-vehicle communication
28. A Secure Enhanced Non-Cooperative Cognitive Division Multiple Access for Vehicle-to-Vehicle Communication.
29. Performance Enriching Channel Allocation Algorithm for Vehicle-to-Vehicle City, Highway and Rural Network
30. Deep Learning-Based Drone Classification Using Radar Cross Section Signatures at mmWave Frequencies
31. Inaudible Attack on AI Speakers
32. Cyber Security Challenges of Big Data Applications in Cloud Computing: A State of the Art
33. Highly Uncertain and Dynamic Environment for Performing Varied Classes of Drone Classification
34. Implementation of a New Cognitive and Distributed Channel Algorithm for Ad Hoc Network
35. COVID-19 X-Ray Image Classification Using Deep Convolution Neural Network
36. Towards Urdu Name Entity Recognition Using Bi-LSTM-CRF with Self-attention
37. Image-Based Automatic Human Protein Cell Nuclei Segmentation and Detection for Cancer Diagnosis in Digital Pathology
38. An Improved Kalman Filter Measurement Model Employing Regularized Least-Squares Problem
39. Attack on AI Smart Speakers with a Laser Beam
40. A Review on Planted (
41. Recommended System for Cluster Head Selection in a Remote Sensor Cloud Environment Using the Fuzzy-Based Multi-Criteria Decision-Making Technique
42. Proceedings of 3rd International Conference on Smart Computing and Cyber Security : Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2023)
43. Moving Ad Hoc Networks—A Comparative Study
44. Graph Theory-Based Numerical Algorithm to Secure WSAN Network with Low Delay and Energy Consumption
45. Secure Marine Communication Under Distributed Slotted MAC
46. Integrating Complete Locomotive Assistance and IoT-Based Health Care for the Disabled
47. Real-Time Access Control System Method Using Face Recognition
48. Deep Learning-Based Apple Defect Detection with Residual SqueezeNet
49. Mood Enhancer Based on Facial Expression Using Machine Learning and Virtual Assistant Technology—An Android App
50. Apple Defect Detection Based on Deep Convolutional Neural Network
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.