|
|
|
Forat Yasir AlJaberi
In this study, several adsorption models were studied to predict the adsorption kinetics of turbidity on an electro-generated adsorbent throughout the electrocoagulation remediation of real groundwater. A new design for an electrocoagulation reactor cons...
ver más
|
|
|
|
|
|
|
Yasir Nawaz, Muhammad Shoaib Arif and Kamaleldin Abodayeh
The novelty of this paper is to propose a numerical method for solving ordinary differential equations of the first order that include both linear and nonlinear terms (ODEs). The method is constructed in two stages, which may be called predictor and corr...
ver más
|
|
|
|
|
|
|
Ghulam Rasool, Yasir Hussain, Tariq Umer, Jawad Rasheed, Sook Fern Yeo and Fatih Sahin
Software design patterns have a proven impact on the quality of software applications and the development process of an application. The success of design patterns in the software industry has attracted mobile game developers and researchers to apply pat...
ver más
|
|
|
|
|
|
|
Alaa Ghazi, Yasir Hashim
Pág. 271 - 278
|
|
|
|
|
|
|
Muhammad Yasir, Abdoul Jelil Niang, Md Sakaouth Hossain, Qamar Ul Islam, Qian Yang and Yuhang Yin
We aimed to improve the performance of ship detection methods in synthetic aperture radar (SAR) images by utilizing machine learning (ML) and artificial intelligence (AI) techniques. The maritime industry faces challenges in collecting precise data due t...
ver más
|
|
|
|
|
|
|
Zixiang Shan, Shixing Zhou, Asma Shah, Yasir Arafat, Syed Arif Hussain Rizvi and Hua Shao
The allelopathy definition accepted by the International Allelopathy Society is any process or phenomenon via which organisms such as plants, microorganism, viruses, and fungi release specific metabolites, known as allelochemicals, into the environment t...
ver más
|
|
|
|
|
|
|
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si...
ver más
|
|
|
|
|
|
|
Muhammad Ijaz, Sami Ul-Allah, Ahmad Sher, Abdul Sattar, Khalid Mahmood, Saud Alamri, Yasir Ali, Farhan Rafiq, Syed Muhammad Shaharyar, Bader Ijaz and Ijaz Hussain
Wheat (Triticum aestivum L.) is a staple and the most important food crop around the world. The growth and productivity of wheat are influenced by different factors, viz., sowing time, tillage system and nutrient application. The current field experiment...
ver más
|
|
|
|
|
|
|
Muhammad Nawaz, Waqas Ahmed, Muhammad Yasir, Ihtisham Islam, Hammad Tariq Janjuhah, George Kontakiotis, Assimina Antonarakou and Christina Stouraiti
The utilization of dimension stone in construction has been prevalent since ancient times; however, its application in modern construction has gained significant attention over the last few decades. This research aimed to assess the physical and strength...
ver más
|
|
|
|
|
|
|
Pummy Dhiman, Anupam Bonkra, Amandeep Kaur, Yonis Gulzar, Yasir Hamid, Mohammad Shuaib Mir, Arjumand Bano Soomro and Osman Elwasila
Recent developments in IoT, big data, fog and edge networks, and AI technologies have had a profound impact on a number of industries, including medical. The use of AI for therapeutic purposes has been hampered by its inexplicability. Explainable Artific...
ver más
|
|
|
|