Showing 3,261 - 3,280 results of 7,095 for search '(((spinae OR (shing OR shin)) OR ((fine OR line) OR find)) OR ((spins OR (long OR wong)) OR pin))', query time: 0.10s Refine Results
  1. 3261

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Article
  2. 3262
  3. 3263

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Article
  4. 3264

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Article
  5. 3265
  6. 3266

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2022
    “…Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Article
  7. 3267

    Study on promote occupational safety and health practices in construction projects by Shahna, Ebrahim Awadh Mubarak

    Published 2018
    “…Safety is an important issue, but many employers do not feel it is vital to the success of companies. For a long time, the construction industry has been labeled as with poor OSHP and performance, which needs stern attention and in-depth research to put forward solutions to this issue. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 3268

    Single-sided magnetic nanoparticles imaging scanner for early detection of breast cancer by Abubakar Sadiq, Abdulkadir

    Published 2018
    “…Furthermore, the scanners have long signal acquisition time and high memory requirement. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 3269

    Faulty sensor detection using data correlation of multivariant sensor reading in smart agriculture with IOT by Malik, Ahmed Dhahir

    Published 2019
    “…Also, when the sensor gives a constant reading for a long time the system has got a fault in this sensor. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 3270

    Pulse electric field effect on cervical cancer cell: a plant based anti-cancer study by Ganeson, Suhassni

    Published 2018
    “…This necessitates alternate anti-cancer treatment as the conventional treatment have resulted in high number of long- term survivors who are left to deal with the aftereffect of their therapy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 3271

    Professional doctorate in health psychology : thesis portfolio (Whippey : 2018) by Whippy, Nicola

    Published 2017
    “…When starting this course, it took me a long time to decide on an original topic of research for the thesis, (Section C3, page 109) and I feel that at the beginning, when writing my ethics proposal, my thought process was much more basic. …”
    Get full text
    Thesis
  12. 3272
  13. 3273
  14. 3274
  15. 3275

    Secure channel free public key encryption with multiple keywords search by Ma, Yang

    Published 2020
    “…This PhD research aims to propose a few PEKS schemes in order to solve both Single and Multiple Keyword(s) Search issues and resist Off-line Keyword Guessing Attack (OKGA) and/or Inside Keyword Guessing Attack (IKGA). …”
    Get full text
    Thesis
  16. 3276

    توظيف الألعاب المحوسبة في تعلّم اللغة العربية وتعليمها لغير الناطقين بها للطلاب للمبتدئين في الجامعة الإسلامية العالمية بماليزيا أنموذجا... by Sahrir, Muhammad Sabri, Mohamed Gameil Ali, Hussein

    Published 2011
    “…In fact, there are many studies and research conducted in educational computer games at the moment, particularly in the areas other than Arabic especially in Western countries. However, we find that the attention of scholars for this research in Malaysia is still at an early age, especially among researchers and teachers of Arabic. …”
    Get full text
    Proceeding Paper
  17. 3277

    Information from pharmaceutical companies and the quality, quantity, and cost of physicians' prescribing: a systematic review by Spurling, Geoffrey K., Mansfield, Peter R., Montgomery, Brett D., Lexchin, Joel, Doust, Jenny, Othman, Noordin, Vitry, Agnes I.

    Published 2010
    “…The narrative synthesis finding of variable results was supported by a meta-analysis of studies of prescribing frequency that found significant heterogeneity. …”
    Get full text
    Article
  18. 3278
  19. 3279

    New composite coagulant from agro-waste (tapioca peel) and polyaluminium chloride for primary landfill leachate treatment by Mohd Salleh, Siti Nor Aishah

    Published 2021
    “…Response surface methodology (RSM) was applied after using the conventional method of one-factor-at-a-time (OFAT) optimisation to find the optimum pH for the leachate sample and dosage of PACTPPg. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 3280

    Beyond individual flow: distributed flow in ice hockey, its antecedents and consequences to performance by Reidelberger, Melissa

    Published 2023
    “…Mental toughness had both a direct and indirect effect on flow, which increased performance. This finding was in line with previous research, confirming the integrity of the data and allowing for the new individual subscales to be analysed in the same fashion. …”
    Get full text
    Thesis