[PDF][PDF] Exploring the top five evolving threats in cybersecurity: an in-depth overview
The term cybersecurity refers to an environment capable of protecting digital devices,
networks and information from unauthorized access and preventing data theft or alteration. It …
networks and information from unauthorized access and preventing data theft or alteration. It …
Towards artificial intelligence-based cybersecurity: The practices and ChatGPT generated ways to combat cybercrime
Today, cybersecurity is considered one of the most noteworthy topics that are circulated
frequently among companies in order to protect their data from hacking operations. The …
frequently among companies in order to protect their data from hacking operations. The …
Analysis of recent deep learning techniques for Arabic handwritten-text OCR and post-OCR correction
R Najam, S Faizullah - Applied Sciences, 2023 - mdpi.com
Arabic handwritten-text recognition applies an OCR technique and then a text-correction
technique to extract the text within an image correctly. Deep learning is a current paradigm …
technique to extract the text within an image correctly. Deep learning is a current paradigm …
MobileNetV1-based deep learning model for accurate brain tumor classification
Brain tumors are among the most dangerous diseases that lead to mortality after a period of
time from injury. Therefore, physicians and healthcare professionals are advised to make an …
time from injury. Therefore, physicians and healthcare professionals are advised to make an …
[PDF][PDF] The purpose of cybersecurity governance in the digital transformation of public services and protecting the digital environment
As it tries to incorporate computer-based technology into the public services provided by
businesses or organisations, the digital transformation process is currently regarded one of …
businesses or organisations, the digital transformation process is currently regarded one of …
[PDF][PDF] Cybersecurity Challenges in Smart Cities: An Overview and Future Prospects
Today, most governments in the world are considering establishing smart cities that work
through the use of the latest technological means. Where smart cities are considered …
through the use of the latest technological means. Where smart cities are considered …
[PDF][PDF] Advancing construction with IoT and RFID technology in civil engineering: A technology review
Nowadays, the realm of civil engineering has expanded to encompass Internet of Things
(IoT) technologies, which can contribute to making sustainable, high-performing, and …
(IoT) technologies, which can contribute to making sustainable, high-performing, and …
[PDF][PDF] Introduction to the data mining techniques in cybersecurity
As a result of the evolution of the Internet and the massive amount of data that is transmitted
every second, as well as the methods for protecting and preserving it and distinguishing …
every second, as well as the methods for protecting and preserving it and distinguishing …
[PDF][PDF] The Distinction between R-CNN and Fast RCNN in Image Analysis: A Performance Comparison
Deep learning techniques have become vital in many fields in the modern era because they
are excellent at analysing and predicting real big data to act in different situations. Although …
are excellent at analysing and predicting real big data to act in different situations. Although …
Artificial intelligence-based prediction of crude oil prices using multiple features under the effect of Russia–Ukraine war and COVID-19 pandemic
The effect of the COVID-19 pandemic on crude oil prices just faded; at this moment, the
Russia–Ukraine war brought a new crisis. In this paper, a new application is developed that …
Russia–Ukraine war brought a new crisis. In this paper, a new application is developed that …