Integrated cloud computing and blockchain systems: A review

M Alshinwan, A Shdefat, N Mostafa… - … Journal of Data and …, 2023 - m.growingscience.com
Cloud computing supplies computer services over the Internet, including servers, storage,
databases, networking, software, analytics, and intelligence, to provide quicker innovation …

[PDF][PDF] 3D-cnnhsr: A 3-dimensional convolutional neural network for hyperspectral super-resolution

MA Haq, SBH Hassine, SJ Malebary… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
Hyperspectral images can easily discriminate different materials due to their fine spectral
resolution. However, obtaining a hyperspectral image (HSI) with a high spatial resolution is …

[HTML][HTML] Improved Graph Convolutional Network with Enriched Graph Topology Representation for Skeleton-Based Action Recognition

T Alsarhan, O Harfoushi, AY Shdefat, N Mostafa… - Electronics, 2023 - mdpi.com
Lately, skeleton-based action recognition has drawn remarkable attention to graph
convolutional networks (GCNs). Recent methods have focused on graph learning because …

AUTOMATED QUALITY ASSESSMENT OF APPLES USING CONVOLUTIONAL NEURAL NETWORKS.

A IOSIF, E MAICAN, S BIRIȘ… - INMATEH-Agricultural …, 2023 - search.ebscohost.com
Quality assessment of apples is a pivotal task in the agriculture and food industries, with
direct implications for economic gains and consumer satisfaction. Traditional methods …

Fine-Tuning Pre-Trained Models for Automated Analysis of Ophthalmic Imaging in Diagnosing Eye Diseases

RE Al Mamlook, A Nasayreh… - … Arab Conference on …, 2023 - ieeexplore.ieee.org
This paper searches into the convergence of such ad-vanced techniques with architectures
like DenseNet201, VGG16, InceptionResNetV2, and NasNetMobile. Our focus centers on …

Improving Memory Malware Detection in Machine Learning With Random Forest-Based Feature Selection

Q Al-Na'amneh, AN Nasayreh… - Risk Assessment and …, 2024 - igi-global.com
Memory analysis is important in malware detection because it may capture a wide range of
traits and behaviors. As aspects of technology evolve, so do the strategies used by malicious …

Enhancing 2D Logistic Chaotic Map for Gray Image Encryption

DA Laila, Q Al-Na'amneh, M Aljaidi… - Risk Assessment and …, 2024 - igi-global.com
Cryptography has demonstrated its utility and efficacy in safeguarding confidential data.
Among the most potent algorithms for encrypting images is chaos theory, owing to its …