UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4
hits: 37
1.
  • Integrated Fuzzy Based Comp... Integrated Fuzzy Based Computational Mechanism for the Selection of Effective Malicious Traffic Detection Approach
    Almotiri, Sultan H. IEEE access, 2021, Volume: 9
    Journal Article
    Peer reviewed
    Open access

    A mechanism to effectively detect malicious traffic in the present context where new cyber criminals and threatening actors are emerging every day, has become a compelling need. These invaders use ...
Full text

PDF
2.
  • Brain Tumor Analysis Empowe... Brain Tumor Analysis Empowered with Deep Learning: A Review, Taxonomy, and Future Challenges
    Nadeem, Muhammad Waqas; Ghamdi, Mohammed A Al; Hussain, Muzammil ... Brain sciences, 02/2020, Volume: 10, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Deep Learning (DL) algorithms enabled computational models consist of multiple processing layers that represent data with multiple levels of abstraction. In recent years, usage of deep learning is ...
Full text

PDF
3.
  • Multi-Level Deep Learning M... Multi-Level Deep Learning Model for Potato Leaf Disease Recognition
    Rashid, Javed; Khan, Imran; Ali, Ghulam ... Electronics (Basel), 09/2021, Volume: 10, Issue: 17
    Journal Article
    Peer reviewed
    Open access

    Potato leaf disease detection in an early stage is challenging because of variations in crop species, crop diseases symptoms and environmental factors. These factors make it difficult to detect ...
Full text

PDF
4.
  • Intelligent Techniques for ... Intelligent Techniques for Detecting Network Attacks: Review and Research Directions
    Aljabri, Malak; Aljameel, Sumayh S.; Mohammad, Rami Mustafa A. ... Sensors (Basel, Switzerland), 10/2021, Volume: 21, Issue: 21
    Journal Article
    Peer reviewed
    Open access

    The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks. Network attacks refer to all types of ...
Full text

PDF
5.
  • A Comparative Systematic Li... A Comparative Systematic Literature Review on Knee Bone Reports from MRI, X-Rays and CT Scans Using Deep Learning and Machine Learning Methodologies
    Khalid, Hafsa; Hussain, Muzammil; Al Ghamdi, Mohammed A. ... Diagnostics (Basel), 07/2020, Volume: 10, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    The purpose of this research was to provide a “systematic literature review” of knee bone reports that are obtained by MRI, CT scans, and X-rays by using deep learning and machine learning techniques ...
Full text

PDF
6.
  • DNA Strands Level Scramblin... DNA Strands Level Scrambling Based Color Image Encryption Scheme
    Iqbal, Nadeem; Hanif, Muhammad; Abbas, Sagheer ... IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    In the past, many image encryption schemes have been developed through the swapping operations at the different levels of granularity. These levels span bits, Deoxyribonucleic acid (DNA) molecules, ...
Full text

PDF
7.
  • A Systematic Review on Moni... A Systematic Review on Monitoring and Advanced Control Strategies in Smart Agriculture
    Hassan, Syeda Iqra; Alam, Muhammad Mansoor; Illahi, Usman ... IEEE access, 2021, Volume: 9
    Journal Article
    Peer reviewed
    Open access

    Automation in agriculture nowadays is the main focus and area of development for various countries. The population rate of the world is increasing rapidly and will be double in upcoming decades and ...
Full text

PDF
8.
  • Healthcare Techniques Throu... Healthcare Techniques Through Deep Learning: Issues, Challenges and Opportunities
    Nisar, Dur-E-Maknoon; Amin, Rashid; Shah, Noor-Ul-Huda ... IEEE access, 2021, Volume: 9
    Journal Article
    Peer reviewed
    Open access

    In artificial intelligence, deep learning (DL) is a process that replicates the working mechanism of the human brain in data processing, and it also creates patterns for decision making. Deep ...
Full text

PDF
9.
  • Deepfake forensics: a surve... Deepfake forensics: a survey of digital forensic methods for multimodal deepfake identification on social media
    Qureshi, Shavez Mushtaq; Saeed, Atif; Almotiri, Sultan H. ... PeerJ. Computer science, 05/2024, Volume: 10
    Journal Article
    Peer reviewed
    Open access

    The rapid advancement of deepfake technology poses an escalating threat of misinformation and fraud enabled by manipulated media. Despite the risks, a comprehensive understanding of deepfake ...
Full text
10.
Full text

PDF
1 2 3 4
hits: 37

Load filters