[PDF][PDF] Managing health supply chain using blockchain technology: state of art challenges and solution

Y Sabri, S Harchi, N El Kamoun - International Journal of …, 2022 - researchgate.net
The COVID-19 flare-up in late 2019 caused a worldwide medical crisis. In a littlemore than a
quarter of a year, the quantity of COVID new cases has risen to in excessof 1,000,000 …

[PDF][PDF] Intrusion detection systems for internet of thing based big data: a review

I Laassar, MY Hadi - International Journal of Reconfigurable and …, 2023 - researchgate.net
Network security is one of the foremost anxieties of the modern time. Over the previous
years, numerous studies have been accompanied on the intrusion detection system …

A proposed biometric authentication hybrid approach using iris recognition for improving cloud security

H El-Sofany, B Bouallegue, YM Abd El-Latif - Heliyon, 2024 - cell.com
Biometric systems have gained attention as a more secure alternative to traditional
authentication methods. However, these systems are not without their technical limitations …

[PDF][PDF] Heart disease classification using various heuristic algorithms

A Ullah, SA Khan, T Alam… - International Journal of …, 2022 - researchgate.net
In the health sector, the computer-aided diagnosis (CAD) system is a rapidly growing
technology because medical diagnostic systems make a huge change as compared to the …

Generalization of linear and non-linear support vector machine in multiple fields: a review

SN Khan, SU Khan, H Aznaoui… - Computer Science …, 2023 - csit.iaesprime.org
Support vector machines (SVMs) are a set of related supervised learning methods used for
classification and regression. They belong to a family of generalized linear classifiers. In …

For the Nuclei Segmentation of Liver Cancer Histopathology Images, A Deep Learning Detection Approach is Used

Arifullah, A Chakir, D Sebai, A Salam - Engineering Applications of …, 2024 - Springer
One of the cancers that causes the greatest mortality is liver cancer worldwide.
Consequently, early identification and detection of potential Cancer mortality is decreased …

EnhanceDeepIris Model for Iris Recognition Applications

S He, X Li - IEEE Access, 2024 - ieeexplore.ieee.org
In this study, an iris recognition technique based on enhanced EnhanceDeepIris model is
proposed in order to examine iris recognition at a deeper level. The process first uses …

[PDF][PDF] Journal of Advancement in Computing (JAC)

M Sadie, H Aznaoui - 2023 - pdfs.semanticscholar.org
As technology has developed, there are more e-agriculture applications for farming that
make sophisticated use of ICTs such satellite networks, GPS, contemporary computers, and …

[PDF][PDF] Proposed algorithm base optimisation plan for feature selection-based intrusion detection in cloud computing

I Laassar, MY Hadi, HR Arifullah… - Indonesian Journal of …, 2024 - researchgate.net
A crucial element in detecting unusual network system behavior is the network intrusion
detection system (NIDS), which also helps to stop network attacks from happening. Despite …

CloudIoT paradigm acceptance for e-learning: analysis and future challenges.

A Ullah, H Aznaoui, CB Şahin, I Daanoune… - Jurnal …, 2022 - search.ebscohost.com
E-learning is the theme interrelated to the virtualized distance learning with the help of
electronic communication machines, certainly with the help of Internet. CloudIoT paradigm is …