|
|
|
Ramez M. Elmasry, Mohamed A. Abd El Ghany, Mohammed A.-M. Salem and Omar M. Fahmy
Human behavior is regarded as one of the most complex notions present nowadays, due to the large magnitude of possibilities. These behaviors and actions can be distinguished as normal and abnormal. However, abnormal behavior is a vast spectrum, so in thi...
ver más
|
|
|
|
|
|
|
Omar Hernández-González, Felipe Ramírez-Rasgado, Mondher Farza, María-Eusebia Guerrero-Sánchez, Carlos-Manuel Astorga-Zaragoza, Mohammed M?Saad and Guillermo Valencia-Palomo
This paper deals with the problem of the estimation of non-uniformly nonlinear systems with time-varying delays in the state and input. In addition, the problem of the sampled output measurement is also been addressed. Thus, an observer design for a clas...
ver más
|
|
|
|
|
|
|
Mohammed Ismail Alhussam, Jifan Ren, Hongxing Yao and Omar Abu Risha
In recent times, there has been a growing interest in the role of food trade in achieving food security. This study presents a comprehensive analysis of the relationship between food trade and food security within the context of the Belt and Road Initiat...
ver más
|
|
|
|
|
|
|
Omar Mohammed Horani, Ali Khatibi, Anas Ratib AL-Soud, Jacquline Tham and Ahmad Samed Al-Adwan
The adoption of business analytics (BA) has become increasingly important for organizations seeking to gain a competitive edge in today?s data-driven business landscape. Hence, understanding the key factors influencing the adoption of BA at the organizat...
ver más
|
|
|
|
|
|
|
Qadri Hamarsheh, Omar Daoud, Mohammed Baniyounis and Ahlam Damati
The interest in vehicle-to-vehicle communication has gained a high demand in the last decade. This is due to the need for safe and robust smart communication, while this type of communication is vulnerable to latency and power. Therefore, this work propo...
ver más
|
|
|
|
|
|
|
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si...
ver más
|
|
|
|
|
|
|
Mohammed Bouslamti, Amal Elrherabi, El Hassania Loukili, Omar M. Noman, Ramzi A. Mothana, Mansour N. Ibrahim, Rhizlan Abdnim, Meryem Slighoua, Mohamed Bouhrim, Mohamed Bnouham, Badiaa Lyoussi and Ahmed Samir Benjelloun
In the present investigation, the phenolic compounds of Solanum elaeagnifolium were identified, and the plant?s anti-lipase and anti-glycation effects on hemoglobin were discovered through in vitro experiments, as well as its short-term antihyperglycemic...
ver más
|
|
|
|
|
|
|
Fatick Nath, Mohammed Omar Sahed Chowdhury and Md. Masudur Rhaman
The petroleum industry produces a large amount of wastewater, known as produced water (PW), during oil production and processing. This PW contains hazardous organic and inorganic components that can harm the environment. Conventional treatment methods ha...
ver más
|
|
|
|
|
|
|
Saloua Biyada, Hamada Imtara, Karima Elkarrach, Omar Laidi, Asmaa Saleh, Omkulthom Al Kamaly and Mohammed Merzouki
The present investigation is devoted, for the first time, to the potential of autochthonous inoculums through bio-augmentation tests to improve the compost quality and to decrease the composting time during composting of textile waste. For this reason, t...
ver más
|
|
|
|
|
|
|
Omar E. Elejla, Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan and Iznan H. Hasbullah
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control Message Protocol version six (ICMPv6), an essential protocol to the IPv6 n...
ver más
|
|
|
|