Search Results - "Arshad, Humaira"
-
1
State-of-the-art in artificial neural network applications: A survey
Published in Heliyon (01-11-2018)“…This is a survey of neural network applications in the real-world scenario. It provides a taxonomy of artificial neural networks (ANNs) and furnish the reader…”
Get full text
Journal Article -
2
Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition
Published in IEEE access (2019)“…The era of artificial neural network (ANN) began with a simplified application in many fields and remarkable success in pattern recognition (PR) even in…”
Get full text
Journal Article -
3
A Review on the Security of the Internet of Things: Challenges and Solutions
Published in Wireless personal communications (01-08-2021)“…The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health,…”
Get full text
Journal Article -
4
The electrochemical reaction controlled optical response of cholestrol oxidase (COx) conjugated CdSe/ZnS quantum dots
Published in Scientific reports (24-11-2020)“…This paper reports the enhanced performance of cholesterol oxidase (COx) conjugated CdSe/ZnS quantum dots (QDs) by using water-soluble mercaptoacitic acid…”
Get full text
Journal Article -
5
A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks
Published in Sensors (Basel, Switzerland) (01-02-2022)“…Currently, law enforcement and legal consultants are heavily utilizing social media platforms to easily access data associated with the preparators of…”
Get full text
Journal Article -
6
Enhancing Smishing Detection: A Deep Learning Approach for Improved Accuracy and Reduced False Positives
Published in IEEE access (2024)“…The widespread use of smartphones and their constant connection to the Internet makes them vulnerable to phishing attacks. Phishing is the act of sending…”
Get full text
Journal Article -
7
Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks
Published in IEEE access (2022)“…The staggering development of cyber threats has propelled experts, professionals and specialists in the field of security into the development of more…”
Get full text
Journal Article -
8
Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp
Published in Wireless personal communications (01-06-2020)“…In this paper, an enhanced honey encryption (HE) scheme for reinforcing the security of instant messaging systems and confounding the time and resources of…”
Get full text
Journal Article -
9
An Energy-Aware, Highly Available, and Fault-Tolerant Method for Reliable IoT Systems
Published in IEEE access (2021)“…The Internet of Things (IoT) is one of the highly influencing and promising technologies of today's world, consisting of sensor devices. The internet smoothly…”
Get full text
Journal Article -
10
Robust Parameter Optimisation of Noise-Tolerant Clustering for DENCLUE Using Differential Evolution
Published in Mathematics (Basel) (01-11-2024)“…Clustering samples based on similarity remains a significant challenge, especially when the goal is to accurately capture the underlying data clusters of…”
Get full text
Journal Article -
11
Message Scheduling in Blockchain Based IoT Environment With Additional Fog Broker Layer
Published in IEEE access (2022)“…Recently researchers and companies have shown significant interest in merging blockchain and the Internet of Things (IoT) to create a safe, reliable, and…”
Get full text
Journal Article -
12
HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys
Published in Health informatics journal (01-09-2020)“…Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy…”
Get full text
Journal Article -
13
Enhanced Parameter Estimation of DENsity CLUstEring (DENCLUE) Using Differential Evolution
Published in Mathematics (Basel) (01-09-2024)“…The task of finding natural groupings within a dataset exploiting proximity of samples is known as clustering, an unsupervised learning approach. Density-based…”
Get full text
Journal Article -
14
Protection-Enhanced Watermarking Scheme Combined with Non-linear Systems
Published in IEEE access (01-01-2023)“…Communication of the images over the network calls for an approach to ensure security and ownership protection while exchanging images over the network. This…”
Get full text
Journal Article -
15
A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems
Published in IEEE access (2019)“…Communication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of…”
Get full text
Journal Article -
16
Feature Selection by Multiobjective Optimization: Application to Spam Detection System by Neural Networks and Grasshopper Optimization Algorithm
Published in IEEE access (2022)“…Networks are strained by spam, which also overloads email servers and blocks mailboxes with unwanted messages and files. Setting the protective level for spam…”
Get full text
Journal Article -
17
EFFECTS OF DAILY ORAL IRON SUPPLEMENTATION ON HISTOMORPHOLOGY OF RAT PLACENTA
Published in Pakistan Armed Forces medical journal (01-02-2019)“…Excessive maternal iron intake can be associated with premature delivery, low birthweight11, local iron excess and iron mediated oxidative stress in intestinal…”
Get full text
Journal Article -
18
AMELIORATIVE EFFECT OF DILTIAZEM ON THE MONOSODIUM GLUTAMATE TREATED STROMA OF FALLOPIAN TUBE AND SERUM ESTROGEN LEVELS
Published in Pakistan Armed Forces medical journal (31-08-2018)“…Objective: To study the effect of diltiazem on monosodium glutamate induced histomorphological changes in the fallopian tube.Study Design: Randomized…”
Get full text
Journal Article -
19
The internet of things security: A survey encompassing unexplored areas and new insights
Published in Computers & security (01-01-2022)“…The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of life undertakings, mandates continuous research pursuits in…”
Get full text
Journal Article -
20
Formal knowledge model for online social network forensics
Published in Computers & security (01-02-2020)“…Currently, examining social media networks is an integral part of most investigations. However, getting a clear view of the events relevant to the incident…”
Get full text
Journal Article