NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 12
1.
  • A New Double-Switch SEPIC-B... A New Double-Switch SEPIC-Buck Topology for Renewable Energy Applications
    Emar, Walid; Issa, Haitham; Kanaker, Hasan ... Energies, 01/2024, Letnik: 17, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    In addition to their conventional use in electric motor drives, DC-DC converters have a variety of other uses, such as energy storage, energy conversion, cyber security systems, uninterruptible power ...
Celotno besedilo
2.
  • Online Banking User Authent... Online Banking User Authentication Methods: A Systematic Literature Review
    Karim, Nader Abdel; Khashan, Osama Ahmed; Kanaker, Hasan ... IEEE access, 2024, Letnik: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Online banking has become increasingly popular in recent years, making it a target for cyberattacks. Banks have implemented various user authentication methods to protect their customers' online ...
Celotno besedilo
3.
Celotno besedilo
4.
Celotno besedilo
5.
Celotno besedilo
6.
Celotno besedilo

PDF
7.
  • Leveraging Big Data and AI ... Leveraging Big Data and AI in Mobile Shopping: A Study in the Context of Jordan
    Abuhamdeh, Maher; Qtaish, Osama; Kanaker, Hasan ... International journal of advanced computer science & applications, 2023, Letnik: 14, Številka: 7
    Journal Article
    Odprti dostop

    This study investigates the current state of mobile shopping in Jordan and the integration of big data and AI technologies in this context. A mixed-methods approach, combining qualitative and ...
Celotno besedilo
8.
  • Web Attack Intrusion Detect... Web Attack Intrusion Detection System Using Machine Learning Techniques
    Baklizi, Mahmoud Khalid; Atoum, Issa; Alkhazaleh, Mohammad ... International Journal of Online and Biomedical Engineering, 01/2024, Letnik: 20, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Web attacks often target web applications because they can be accessed over a network and often have vulnerabilities. The success of an intrusion detection system (IDS) in detecting web attacks ...
Celotno besedilo
9.
  • Trojan Horse Infection Dete... Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning
    Kanaker, Hasan; Abdel Karim, Nader; A.B. Awwad, Samer ... International journal of interactive mobile technologies, 12/2022, Letnik: 16, Številka: 24
    Journal Article
    Recenzirano

    Cloud computing technology is known as a distributed computing network, which consists of a large number of servers connected via the internet. This technology involves many worthwhile resources, ...
Celotno besedilo
10.
  • Advancesin The Processing And Analysis of Medical Images Using Neural Networks
    Abdulla Mousa Falah Alali; Hasan Mahmoud Sha’ban Kanaker NeuroQuantology, 01/2022, Letnik: 20, Številka: 6
    Journal Article

    Images are considered a large source of information in areas such as communication, storage, and medicine.However, recognizing all the data they contain is difficult. This is where image processing ...
Celotno besedilo
1 2
zadetkov: 12

Nalaganje filtrov