[PDF][PDF] Anonymous Financial Transactions in Hidden Illegal Trades

MA Younes Taher, A Khatri, A Mansour - researchgate.net
This study examines the methodologies and findings of recent studies on the usage patterns
of Bitcoin addresses that were gathered over the span of 18 months beginning in June 2020 …

[PDF][PDF] Face recognition by deep learning Algorithems

Y Taher, A Yousef, Y Ahmad, A Khatri - researchgate.net
one of the commen face recognition methods utlized in identification and securirty. one of
the proplem in face recognitiom can be errors in featuer detecion due to illumination or opse …

Review on pre-fetching for Mobile Cloud Computing

NS Hussien, S Sulaiman… - 2013 IEEE Conference …, 2013 - ieeexplore.ieee.org
Improvement of our technology on mobile devices and the significant of cloud computing
(CC) services has led to the integration of mobile devices with a CC service called as Mobile …

[PDF][PDF] IOT and Machin Learning

A Khatri, A Peter - researchgate.net
Communication is the process of sending and receiving messages through signs or
language or behavior or any other means. Currently, person-to-person communication is …

[PDF][PDF] The Evolution of Environment for Collaborative Mobile Cloud

S Song, S Kim, YI Yoon - Parallel and Cloud Computing Research, 2014 - academia.edu
Cloud Computing technology has been applied to mobile devices. A variety of tasks is made
possible despite the technical limitations. Also, the Cloud can be treated as a virtual space …

[引用][C] Wide flat region photos statistical steganalysis

AA Jabbar, SB Sahib, M Zamani - Journal of …, 2013 - Advanced Institutes of Convergence …

[引用][C] Edgy photos statistical steganalysis

AA Jabbar, SB Sahib, M Zamani - Advances in …, 2013 - Advanced Institutes of Convergence …

[引用][C] Effective measures for evaluation of sql injection detection and prevention tools

A Tajpour, S Ibrahim, M Zamani… - Journal of …, 2013 - Advanced Institutes of Convergence …

[引用][C] An enhanced rfid confidentiality protection model based on trusted authentication

M Gharooni, M Zamani… - International …, 2013 - Advanced Institutes of Convergence …

[引用][C] An in-depth analysis of the major cryptocurrency security attacks

M Sadeghi