Search Results - "ABRO, Abdul Ahad"
-
1
Vote-Based: Ensemble Approach
Published in Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi (30-06-2021)“…Vote-based is one of the ensembles learning methods in which the individual classifier is situated on numerous weighted categories of the training datasets. In…”
Get full text
Journal Article -
2
IoT empowered smart cybersecurity framework for intrusion detection in internet of drones
Published in Scientific reports (27-10-2023)“…The emergence of drone-based innovative cyber security solutions integrated with the Internet of Things (IoT) has revolutionized navigational technologies with…”
Get full text
Journal Article -
3
A Blockchain and Metaheuristic-Enabled Distributed Architecture for Smart Agricultural Analysis and Ledger Preservation Solution: A Collaborative Approach
Published in Applied sciences (01-02-2022)“…Distributed forecasting of agriculture commodity prices has an attractive research perspective that delivers active breakthrough analysis of the rapid…”
Get full text
Journal Article -
4
Illuminating Healthcare Management: A Comprehensive Review of IoT-Enabled Chronic Disease Monitoring
Published in IEEE access (01-01-2024)“…Present dynamic performance reputation and technical innovations in Internet of Things (IoT) technologies have endowed ultra-inexpensive, energy efficient,…”
Get full text
Journal Article -
5
A combined approach of base and meta learners for hybrid system
Published in Turkish Journal of Engineering (TUJE) (2023)“…The ensemble learning method is considered a meaningful yet challenging task. To enhance the performance of binary classification and predictive analysis, this…”
Get full text
Journal Article -
6
Natural Language Processing Challenges and Issues: A Literature Review
Published in Gazi University Journal of Science (01-12-2023)“…Natural Language Processing (NLP) is the computerized approach to analyzing text using both structured and unstructured data. NLP is a simple, empirically…”
Get full text
Journal Article -
7
Identifying the Machine Learning Techniques for Classification of Target Datasets
Published in Sukkur IBA Journal of Computing and Mathematical Sciences (Online) (01-07-2020)“…Given the dynamic and convoluted nature of numerous datasets, the necessity of enhancing performance outcomes and handling multiple datasets has become more…”
Get full text
Journal Article -
8
Identifying the Machine Learning Techniques for Classification of Target Datasets
Published in Sukkur IBA Journal of Computing and Mathematical Sciences (Online) (01-07-2020)“…Given the dynamic and convoluted nature of numerous datasets, the necessity of enhancing performance outcomes and handling multiple datasets has become more…”
Get full text
Journal Article -
9
Identifying the Machine Learning Techniques for Classification of Target Datasets
Published in Sukkur IBA Journal of Computing and Mathematical Sciences (Online) (01-07-2020)“…Given the dynamic and convoluted nature of numerous datasets, the necessity of enhancing performance outcomes and handling multiple datasets has become more…”
Get full text
Journal Article -
10
Machine Learning Classifiers: A Brief Primer
Published in University of Sindh journal of information and communication technology (Online) (01-07-2021)“…Machine learning is a prominent and an intensively studied field in the artificial intelligence area which assists to enhance the performance of…”
Get full text
Journal Article -
11
Model Valuation of MPLS utilization Physical and virtual Network on GNS3
Published in University of Sindh journal of information and communication technology (Online) (01-04-2018)“…The various Protocol Label Switching (MPLS) is an evolving technology which have value, efficiency and management quality. On the differing, traditional system…”
Get full text
Journal Article -
12
Design And Develop Network Storage Virtualization By Using GNS3
Published 24-06-2020“…Virtualization is an emerging and optimistic prospect in the IT industry. Its impact has a footprint widely in digital infrastructure. Many innovativeness…”
Get full text
Journal Article -
13
Unveiling The Arsenal of User Data Protection Tools and Practices
Published in 2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC) (08-01-2024)“…In our rapidly evolving digital landscape, the imperative of safeguarding personal data has surged in significance. As lives increasingly intertwine with…”
Get full text
Conference Proceeding -
14
Security and Threat Detection through Cloud-Based Wazuh Deployment
Published in 2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC) (08-01-2024)“…In today's interconnected business landscape, security is the cornerstone of all organizations, irrespective of their size or industry. This research…”
Get full text
Conference Proceeding -
15
A Computer Vision-Based Vehicle Detection System Leveraging Deep Learning
Published in 2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC) (08-01-2024)“…This study uses advanced computer vision (CV) and deep learning (DL) techniques to present a combined approach for extensive vehicle detection and number plate…”
Get full text
Conference Proceeding -
16
AuctiSafe: Building a Robust and Reliable Auction System for Optimized Security Measures
Published in 2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC) (08-01-2024)“…An online auction management system explores the complexities of auction organization and execution. This study investigates the intricacies of online…”
Get full text
Conference Proceeding -
17
Modelling Evaluation of MPLS using Physical and virtual Network on GNS3
Published 18-04-2018“…The Multi-Protocol Label Switching (MPLS) is an emerging technology which have quality, effectiveness and administration quality. On the contrary, traditional…”
Get full text
Journal Article -
18
Secure Network in Business-to-Business application by using Access Control List (ACL) and Service Level Agreement (SLA)
Published 22-12-2016“…Sindh Univ. Res. Jour. (Sci. Ser.) Vol. 48 (4D) 01-04 (2016) The motivation behind this paper is to dissecting the secure network for Business to Business…”
Get full text
Journal Article