Search Results - "Khan, Aamir Hussain"
-
1
Integrated decision-making framework for hospital development: A single-valued neutrosophic probabilistic hesitant fuzzy approach with innovative aggregation operators
Published in Yugoslav Journal of Operations Research (01-01-2024)“…This research article proposes an innovative algorithm for analyzing parallelism in the evolution of hospital building features, with the goal of advancing…”
Get full text
Journal Article -
2
TAIWAN DILEMMA: A FLASHPOINT FOR THE GLOBAL PEACE
Published in Margalla papers (01-06-2024)“…With its multilayered complexities, Taiwan is not just a contentious issue but a potential flashpoint for war between China and the United States (US). Since…”
Get full text
Journal Article -
3
Novel Distance-Based Molecular Descriptors for Styrene Butadiene Rubber Structures
Published in JTAM (Jurnal Teori dan Aplikasi Matematika) (Online) (30-03-2024)“…Styrene-butadiene rubber (SBR) is a general-purpose rubber produced from a copolymer of styrene and butadiene. It is used largely in automobile and truck…”
Get full text
Journal Article -
4
Tuberculosis control and care in the era of COVID-19
Published in Health policy and planning (01-10-2020)“…Tuberculosis (TB) is the leading infectious cause of mortality globally, with almost 4000 daily deaths. The treatment coverage and success rate are ongoing…”
Get full text
Journal Article -
5
Cyber Risk Assessment Model for Critical Information Infrastructure
Published in 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC) (01-02-2020)“…In the age of digitalization, each utility has developed its technology roadmap for implementing Information and Operational Technologies. The technology…”
Get full text
Conference Proceeding -
6
SartCyber Security Awareness Measurement Model (APAT)
Published in 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC) (01-02-2020)“…Critical Information Infrastructures are constantly under the threat from various forms of cyber-attacks. Over the past few years adversaries have found ways…”
Get full text
Conference Proceeding