Search Results - "Ahamad, Danish"

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization by Ahamad, Danish, Alam Hameed, Shabi, Akhtar, Mobin

    “…The rising volume of sensitive and personal data being harvested by data controllers has increased the security essentials in the cloud system. The cloud…”
    Get full text
    Journal Article
  2. 2
  3. 3

    SolarRadnet: A novel variant input scoring optimized recurrent neural network for solar irradiance prediction by Abdalrahman, Alameen E. M., Ahamad, Danish, Md, Mobin Akhtar, Gasmi, Karim

    “…Solar irradiance prediction is an essential one in providing renewable energy proficiently. The solar irradiance plays a major role in solar power system,…”
    Get full text
    Journal Article
  4. 4

    A novel hybrid meta‐heuristic concept for green communication in IoT networks: An intelligent clustering model by Akhtar, MD Mobin, Ahamad, Danish, Abdalrahman, Alameen Eltoum M., Shatat, Abdallah Saleh Ali, Shatat, Ahmad Saleh Ali

    “…Summary Nowadays, there is an emerging need for applications based on the Internet of Things (IoT). The sensor nodes present in the IoT network produce data…”
    Get full text
    Journal Article
  5. 5

    Development of Medidrone: A Drone based Emergency Service System for Saudi Arabian Healthcare by Khan, Nayyar Ahmed, Ahmad, Mohammad, Alam, Shabi, Uddin Siddiqi, Ahmad Masih, Ahamad, Danish, Khalid, Mohammad Nadeem

    “…The current system that is used in Saudi Arabia during the road accidents includes the calling of the emergency ambulance service, which might take a lot of…”
    Get full text
    Conference Proceeding
  6. 6

    Development of Mubadarah System- An Intelligent System for proposals at a University by Khan, Nayyar Ahmed, Ahamad, Danish, Alam, Shabi, Uddin Siddiqi, Ahmad Masih, Nadeem Khalid, Mohammad, Mohammad Nasimuddin, Mohammad Ahmad

    “…this paper gives a complete description for the designing, and the development of a system which will be responsible and useful for proposing various ideas at…”
    Get full text
    Conference Proceeding
  7. 7

    Intrusion Management to avoid Web-Form Spamming in Cloud based architectures by Khan, Nayyar Ahmed, Fareed Mahafdah, Rund, Mohammad Nasimuddin, Mohammad Ahmad, Alomari, Omaia Mohammad, Masih Uddin Siddiqi, Ahmed, Ahamad, Danish

    “…The concept of cloud computing is actually implemented in order to provide a mechanism which makes data truly available and mobile in nature. The availability…”
    Get full text
    Conference Proceeding