Search

Your search keyword '"Khalil, Ibrahim A."' showing total 2,155 results

Search Constraints

Start Over You searched for: Author "Khalil, Ibrahim A." Remove constraint Author: "Khalil, Ibrahim A."
2,155 results on '"Khalil, Ibrahim A."'

Search Results

1. Machine Unlearning with Minimal Gradient Dependence for High Unlearning Ratios

5. Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System

8. Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence

9. Trustworthy Privacy-preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 with Blockchain

10. Smart Policy Control for Securing Federated Learning Management System

11. Blockchain-based Access Control for Secure Smart Industry Management Systems

12. Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems

13. SMPC-based Federated Learning for 6G enabled Internet of Medical Things

14. Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things

15. Primary School Mathematics Teachers' Beliefs about Teaching in Synchronous Virtual Classrooms: A Mixed Method Study

16. COMPARATIVE MORPHOLOGICAL DESCRIPTION OF TONGUE BETWEEN TWO DOMESTICATED WATER BIRDS, MALLARD ANAS PLATYRHYNCHOS (LINNAEUS, 1758) AND GRAYLAG GOOSE ANSER ANSER (LINNAEUS, 1758) (ANSERIFORMES, ANATIDAE)

17. Compact metamaterial-based single/double-negative/near-zero index resonator for 5G sub-6 GHz wireless applications

18. The effect of using natural dyes on physical and mechanical properties of eco-friendly fabrics

19. Big data resolving using Apache Spark for load forecasting and demand response in smart grid: a case study of Low Carbon London Project

20. Deep Learning based Automatic Quantification of Urethral Plate Quality using the Plate Objective Scoring Tool (POST)

21. Development of Powered Semi-Active Ankle-Foot Prosthetic with Fuzzy Logic-PI Controller

22. Adversarial Analysis of the Differentially-Private Federated Learning in Cyber-Physical Critical Infrastructures

23. Teaching Practices of the Mathematics Male and Female Teachers According to the PISA Framework and Its Relation to Their Beliefs towards Their Students

24. Information technology and its impact on developing work in Iraqi banks - Applied research on a sample of private Banks

25. INFLUENCE OF STEEL FIBRES OF CRIMPED AND HOOKED-END SHAPE ON THE MECHANICAL PROPERTIES OF PORTLAND CEMENT

26. Studying Periostin as a Diagnostic Marker in Sera of Iraqi Patients Hypothyroidism

27. Local Differential Privacy for Federated Learning

32. Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security

33. Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability

34. Artificial Intelligence Application in a Case of Mandibular Third Molar Impaction: A Systematic Review of the Literature

36. Global age-sex-specific mortality, life expectancy, and population estimates in 204 countries and territories and 811 subnational locations, 1950–2021, and the impact of the COVID-19 pandemic: a comprehensive demographic analysis for the Global Burden of Disease Study 2021

37. إطار مقترح لتدقيق اضرار الحرب في ضوء المعايير الدولية ومعايير الانتوساي

38. Job burnout and its relationship to achieving competitive superiority among the employees of the University of Baghdad

39. A novel cascade-loop controller for load frequency control of isolated microgrid via dandelion optimizer

40. Magnetic susceptibility in the assessment of toxic heavy metal elements in the surface sediments of Inner Ambon Bay, Maluku province, Indonesia

41. Morphological Features of Tongue in Domestic Cat Felis Catus

42. Blockchain-based Security Framework for Critical Industry 4.0 Cyber-physical System

46. Social Media Identity Deception Detection: A Survey

47. PPaaS: Privacy Preservation as a Service

48. Can the Multi-Incoming Smart Meter Compressed Streams be Re-Compressed?

49. IoTSign: Protecting Privacy and Authenticity of IoT using Discrete Cosine Based Steganography

Catalog

Books, media, physical & digital resources