Search Results - "Arshad, Humaira"

Refine Results
  1. 1

    State-of-the-art in artificial neural network applications: A survey by Abiodun, Oludare Isaac, Jantan, Aman, Omolara, Abiodun Esther, Dada, Kemi Victoria, Mohamed, Nachaat AbdElatif, Arshad, Humaira

    Published in Heliyon (01-11-2018)
    “…This is a survey of neural network applications in the real-world scenario. It provides a taxonomy of artificial neural networks (ANNs) and furnish the reader…”
    Get full text
    Journal Article
  2. 2

    Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition by Abiodun, Oludare Isaac, Kiru, Muhammad Ubale, Jantan, Aman, Omolara, Abiodun Esther, Dada, Kemi Victoria, Umar, Abubakar Malah, Linus, Okafor Uchenwa, Arshad, Humaira, Kazaure, Abdullahi Aminu, Gana, Usman

    Published in IEEE access (2019)
    “…The era of artificial neural network (ANN) began with a simplified application in many fields and remarkable success in pattern recognition (PR) even in…”
    Get full text
    Journal Article
  3. 3

    A Review on the Security of the Internet of Things: Challenges and Solutions by Abiodun, Oludare Isaac, Abiodun, Esther Omolara, Alawida, Moatsum, Alkhawaldeh, Rami S., Arshad, Humaira

    Published in Wireless personal communications (01-08-2021)
    “…The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health,…”
    Get full text
    Journal Article
  4. 4

    The electrochemical reaction controlled optical response of cholestrol oxidase (COx) conjugated CdSe/ZnS quantum dots by Arshad, Humaira, Chaudhry, Madeeha, Mehmood, Shahid, Farooq, Ayesha, Wang, Minqiang, Bhatti, A. S.

    Published in Scientific reports (24-11-2020)
    “…This paper reports the enhanced performance of cholesterol oxidase (COx) conjugated CdSe/ZnS quantum dots (QDs) by using water-soluble mercaptoacitic acid…”
    Get full text
    Journal Article
  5. 5

    A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks by Arshad, Humaira, Abdullah, Saima, Alawida, Moatsum, Alabdulatif, Abdulatif, Abiodun, Oludare Isaac, Riaz, Omer

    Published in Sensors (Basel, Switzerland) (01-02-2022)
    “…Currently, law enforcement and legal consultants are heavily utilizing social media platforms to easily access data associated with the preparators of…”
    Get full text
    Journal Article
  6. 6

    Enhancing Smishing Detection: A Deep Learning Approach for Improved Accuracy and Reduced False Positives by Mehmood, Muhammad Khalid, Arshad, Humaira, Alawida, Moatsum, Mehmood, Abid

    Published in IEEE access (2024)
    “…The widespread use of smartphones and their constant connection to the Internet makes them vulnerable to phishing attacks. Phishing is the act of sending…”
    Get full text
    Journal Article
  7. 7
  8. 8

    Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp by Abiodun, Esther Omolara, Jantan, Aman, Abiodun, Oludare Isaac, Arshad, Humaira

    Published in Wireless personal communications (01-06-2020)
    “…In this paper, an enhanced honey encryption (HE) scheme for reinforcing the security of instant messaging systems and confounding the time and resources of…”
    Get full text
    Journal Article
  9. 9

    An Energy-Aware, Highly Available, and Fault-Tolerant Method for Reliable IoT Systems by Bukhsh, Muhammad, Abdullah, Saima, Rahman, Abdul, Asghar, Mamoona Naveed, Arshad, Humaira, Alabdulatif, Abdulatif

    Published in IEEE access (2021)
    “…The Internet of Things (IoT) is one of the highly influencing and promising technologies of today's world, consisting of sensor devices. The internet smoothly…”
    Get full text
    Journal Article
  10. 10

    Robust Parameter Optimisation of Noise-Tolerant Clustering for DENCLUE Using Differential Evolution by Ajmal, Omer, Arshad, Humaira, Arshed, Muhammad Asad, Ahmed, Saeed, Mumtaz, Shahzad

    Published in Mathematics (Basel) (01-11-2024)
    “…Clustering samples based on similarity remains a significant challenge, especially when the goal is to accurately capture the underlying data clusters of…”
    Get full text
    Journal Article
  11. 11

    Message Scheduling in Blockchain Based IoT Environment With Additional Fog Broker Layer by Ahmad, Israr, Abdullah, Saima, Bukhsh, Muhammad, Ahmed, Adeel, Arshad, Humaira, Khan, Talha Farooq

    Published in IEEE access (2022)
    “…Recently researchers and companies have shown significant interest in merging blockchain and the Internet of Things (IoT) to create a safe, reliable, and…”
    Get full text
    Journal Article
  12. 12

    HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys by Esther Omolara, Abiodun, Jantan, Aman, Abiodun, Oludare Isaac, Arshad, Humaira, Dada, Kemi Victoria, Emmanuel, Etuh

    Published in Health informatics journal (01-09-2020)
    “…Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy…”
    Get full text
    Journal Article
  13. 13

    Enhanced Parameter Estimation of DENsity CLUstEring (DENCLUE) Using Differential Evolution by Ajmal, Omer, Mumtaz, Shahzad, Arshad, Humaira, Soomro, Abdullah, Hussain, Tariq, Attar, Razaz Waheeb, Alhomoud, Ahmed

    Published in Mathematics (Basel) (01-09-2024)
    “…The task of finding natural groupings within a dataset exploiting proximity of samples is known as clustering, an unsupervised learning approach. Density-based…”
    Get full text
    Journal Article
  14. 14

    Protection-Enhanced Watermarking Scheme Combined with Non-linear Systems by Nazir, Hira, Ullah, Muhammad Sami, Qadri, Salman, Arshad, Humaira, Husnain, Mujtaba, Razzaq, Abdul, Nawaz, Syed Ali

    Published in IEEE access (01-01-2023)
    “…Communication of the images over the network calls for an approach to ensure security and ownership protection while exchanging images over the network. This…”
    Get full text
    Journal Article
  15. 15

    A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems by Omolara, Abiodun Esther, Jantan, Aman, Isaac Abiodun, Oludare, Victoria Dada, Kemi, Arshad, Humaira, Emmanuel, Etuh

    Published in IEEE access (2019)
    “…Communication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of…”
    Get full text
    Journal Article
  16. 16
  17. 17

    EFFECTS OF DAILY ORAL IRON SUPPLEMENTATION ON HISTOMORPHOLOGY OF RAT PLACENTA by Noor, Umbreen, Afsheen, Afeera, Arshad, Humaira, Qamar, Khadija

    Published in Pakistan Armed Forces medical journal (01-02-2019)
    “…Excessive maternal iron intake can be associated with premature delivery, low birthweight11, local iron excess and iron mediated oxidative stress in intestinal…”
    Get full text
    Journal Article
  18. 18

    AMELIORATIVE EFFECT OF DILTIAZEM ON THE MONOSODIUM GLUTAMATE TREATED STROMA OF FALLOPIAN TUBE AND SERUM ESTROGEN LEVELS by Zia, Muhammad Sarwar, Mehboob, Khadija, Arshad, Humaira, Qamar, Khadija, Khan, Faaiz Ul Huda

    Published in Pakistan Armed Forces medical journal (31-08-2018)
    “…Objective: To study the effect of diltiazem on monosodium glutamate induced histomorphological changes in the fallopian tube.Study Design: Randomized…”
    Get full text
    Journal Article
  19. 19

    The internet of things security: A survey encompassing unexplored areas and new insights by Omolara, Abiodun Esther, Alabdulatif, Abdullah, Abiodun, Oludare Isaac, Alawida, Moatsum, Alabdulatif, Abdulatif, Alshoura, Wafa’ Hamdan, Arshad, Humaira

    Published in Computers & security (01-01-2022)
    “…The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of life undertakings, mandates continuous research pursuits in…”
    Get full text
    Journal Article
  20. 20

    Formal knowledge model for online social network forensics by Arshad, Humaira, Jantan, Aman, Hoon, Gan Keng, Abiodun, Isaac Oludare

    Published in Computers & security (01-02-2020)
    “…Currently, examining social media networks is an integral part of most investigations. However, getting a clear view of the events relevant to the incident…”
    Get full text
    Journal Article