Search Results - "ABRO, Abdul Ahad"

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Vote-Based: Ensemble Approach by ABRO, Abdul Ahad

    “…Vote-based is one of the ensembles learning methods in which the individual classifier is situated on numerous weighted categories of the training datasets. In…”
    Get full text
    Journal Article
  2. 2

    IoT empowered smart cybersecurity framework for intrusion detection in internet of drones by Ashraf, Syeda Nazia, Manickam, Selvakumar, Zia, Syed Saood, Abro, Abdul Ahad, Obaidat, Muath, Uddin, Mueen, Abdelhaq, Maha, Alsaqour, Raed

    Published in Scientific reports (27-10-2023)
    “…The emergence of drone-based innovative cyber security solutions integrated with the Internet of Things (IoT) has revolutionized navigational technologies with…”
    Get full text
    Journal Article
  3. 3
  4. 4

    Illuminating Healthcare Management: A Comprehensive Review of IoT-Enabled Chronic Disease Monitoring by Talpur, Mir Sajjad Hussain, Abro, Abdul Ahad, Ebrahim, Mansoor, Kandhro, Irfan Ali, Manickam, Selvakumar, Arfeen, Shams Ul, Dandoush, Abdulhalim, Uddin, Mueen

    Published in IEEE access (01-01-2024)
    “…Present dynamic performance reputation and technical innovations in Internet of Things (IoT) technologies have endowed ultra-inexpensive, energy efficient,…”
    Get full text
    Journal Article
  5. 5

    A combined approach of base and meta learners for hybrid system by Abdul Ahad Abro, Waqas Ahmed Siddique, Mir Sajjad Hussain Talpur, Awais Khan Jumani, Erkan Yasar

    “…The ensemble learning method is considered a meaningful yet challenging task. To enhance the performance of binary classification and predictive analysis, this…”
    Get full text
    Journal Article
  6. 6

    Natural Language Processing Challenges and Issues: A Literature Review by ABRO, Abdul Ahad, TALPUR, Mir Sajjad Hussain, JUMANİ, Awais Khan

    Published in Gazi University Journal of Science (01-12-2023)
    “…Natural Language Processing (NLP) is the computerized approach to analyzing text using both structured and unstructured data. NLP is a simple, empirically…”
    Get full text
    Journal Article
  7. 7

    Identifying the Machine Learning Techniques for Classification of Target Datasets by Abdul Ahad Abro, Mohammed Abebe Yimer, Zeeshan Bhatti

    “…Given the dynamic and convoluted nature of numerous datasets, the necessity of enhancing performance outcomes and handling multiple datasets has become more…”
    Get full text
    Journal Article
  8. 8

    Identifying the Machine Learning Techniques for Classification of Target Datasets by Abdul Ahad Abro, Mohammed Abebe Yimer, Zeeshan Bhatti

    “…Given the dynamic and convoluted nature of numerous datasets, the necessity of enhancing performance outcomes and handling multiple datasets has become more…”
    Get full text
    Journal Article
  9. 9

    Identifying the Machine Learning Techniques for Classification of Target Datasets by Abdul Ahad Abro, Mohammed Abebe Yimer, Zeeshan Bhatti

    “…Given the dynamic and convoluted nature of numerous datasets, the necessity of enhancing performance outcomes and handling multiple datasets has become more…”
    Get full text
    Journal Article
  10. 10

    Machine Learning Classifiers: A Brief Primer by Abdul Ahad Abro, Abdullah Ayub Khan, Mir Sajjad Hussain Talpur, Idrissa Kayijuka, Erkan Yaşar

    “…Machine learning is a prominent and an intensively studied field in the artificial intelligence area which assists to enhance the performance of…”
    Get full text
    Journal Article
  11. 11

    Model Valuation of MPLS utilization Physical and virtual Network on GNS3 by Abdul Ahad Abro, Abdul Basit Abro, Mehwish Abro, Asad Aslam Siddique

    “…The various Protocol Label Switching (MPLS) is an evolving technology which have value, efficiency and management quality. On the differing, traditional system…”
    Get full text
    Journal Article
  12. 12

    Design And Develop Network Storage Virtualization By Using GNS3 by Abro, Abdul Ahad, Shaikh, Ufaque

    Published 24-06-2020
    “…Virtualization is an emerging and optimistic prospect in the IT industry. Its impact has a footprint widely in digital infrastructure. Many innovativeness…”
    Get full text
    Journal Article
  13. 13

    Unveiling The Arsenal of User Data Protection Tools and Practices by Moiz, Syed, Abro, Abdul Ahad, Ebrahim, Mansoor, Abro, Abdul Basit

    “…In our rapidly evolving digital landscape, the imperative of safeguarding personal data has surged in significance. As lives increasingly intertwine with…”
    Get full text
    Conference Proceeding
  14. 14

    Security and Threat Detection through Cloud-Based Wazuh Deployment by Moiz, Syed, Majid, Abdul, Basit, Abdul, Ebrahim, Mansoor, Abro, Abdul Ahad, Naeem, Mehwish

    “…In today's interconnected business landscape, security is the cornerstone of all organizations, irrespective of their size or industry. This research…”
    Get full text
    Conference Proceeding
  15. 15

    A Computer Vision-Based Vehicle Detection System Leveraging Deep Learning by Khan, Saadullah, Vohra, Sanayna, Siddique, Sultan Abdullah, Abro, Abdul Ahad, Ebrahim, Mansoor

    “…This study uses advanced computer vision (CV) and deep learning (DL) techniques to present a combined approach for extensive vehicle detection and number plate…”
    Get full text
    Conference Proceeding
  16. 16

    AuctiSafe: Building a Robust and Reliable Auction System for Optimized Security Measures by Ali, Wajiha Jawwad, Latif, Abdul Qadir Abdul, Ali, Muhammad Yasir Mehboob, Ali, Ibrar, Ebrahim, Mansoor, Abro, Abdul Ahad

    “…An online auction management system explores the complexities of auction organization and execution. This study investigates the intricacies of online…”
    Get full text
    Conference Proceeding
  17. 17

    Modelling Evaluation of MPLS using Physical and virtual Network on GNS3 by Abro, Abdul Ahad, Abro, Abdul Basit, Abro, Mehvish, Siddique, Asad Aslam

    Published 18-04-2018
    “…The Multi-Protocol Label Switching (MPLS) is an emerging technology which have quality, effectiveness and administration quality. On the contrary, traditional…”
    Get full text
    Journal Article
  18. 18

    Secure Network in Business-to-Business application by using Access Control List (ACL) and Service Level Agreement (SLA) by Abro, Abdul Ahad, Soomro, Safeeullah, Alansari, Zainab, Belgaum, Mohammad Riyaz, Khakwani, Abdul Baqi Khan

    Published 22-12-2016
    “…Sindh Univ. Res. Jour. (Sci. Ser.) Vol. 48 (4D) 01-04 (2016) The motivation behind this paper is to dissecting the secure network for Business to Business…”
    Get full text
    Journal Article