Search Results - "Mahmud, Maqsood"

Refine Results
  1. 1

    Frequency based feature selection method using whale algorithm by Nematzadeh, Hossein, Enayatifar, Rasul, Mahmud, Maqsood, Akbari, Ebrahim

    Published in Genomics (San Diego, Calif.) (01-12-2019)
    “…Feature selection is the problem of finding the best subset of features which have the most impact in predicting class labels. It is noteworthy that…”
    Get full text
    Journal Article
  2. 2

    Evolutionary-based image encryption using RNA codons truth table by Mahmud, Maqsood, Atta-ur-Rahman, Lee, Malrey, Choi, Jae-Young

    Published in Optics and laser technology (01-01-2020)
    “…•The ribonucleic acid (RNA) concepts and genetic algorithm (GA) are used for high secure image encryption.•GA employs logistic map and RNA to generate its…”
    Get full text
    Journal Article
  3. 3

    A hybrid model based on differential fuzzy logic relationships and imperialist competitive algorithm for stock market forecasting by Sadaei, Hossein Javedani, Enayatifar, Rasul, Lee, Muhammad Hisyam, Mahmud, Maqsood

    Published in Applied soft computing (01-03-2016)
    “…[Display omitted] •A differential fuzzy time series model is defined for forecast inside trend data.•The differential fuzzy logical relationships and groups…”
    Get full text
    Journal Article
  4. 4

    Adoption of open innovation and entrepreneurial orientation practices in Malaysian furniture industry by Wadood, Fazli, Alshaikh, Mohammed Emad, Akbar, Fazal, Mahmud, Maqsood

    “…Objective: The main objective of this research is to integrate the resource-based view (RBV) to analyse how the relationship between firm performance and…”
    Get full text
    Journal Article
  5. 5

    The impact of cyberattacks awareness on customers’ trust and commitment: an empirical evidence from the Pakistani banking sector by Bajwa, Ishtiaq Ahmad, Ahmad, Shabir, Mahmud, Maqsood, Bajwa, Farooq Ahmad

    Published in Information and computer security (16-11-2023)
    “…Purpose The banking industry has always been vulnerable to cyberattacks. In recent years, Pakistan’s banking sector experienced the most intense cyberattack in…”
    Get full text
    Journal Article
  6. 6

    Combining ARFIMA models and fuzzy time series for the forecast of long memory time series by Javedani Sadaei, Hossein, Enayatifar, Rasul, Guimarães, Frederico Gadelha, Mahmud, Maqsood, Alzamil, Zakarya A.

    Published in Neurocomputing (Amsterdam) (29-01-2016)
    “…Long memory time series are stationary processes in which there is a statistical long range dependency between the current value and values in different times…”
    Get full text
    Journal Article
  7. 7

    Stock market forecasting by using a hybrid model of exponential fuzzy time series by Mirzaei Talarposhti, Fatemeh, Javedani Sadaei, Hossein, Enayatifar, Rasul, Gadelha Guimarães, Frederico, Mahmud, Maqsood, Eslami, Tayyebeh

    “…The initial aim of this study is to propose a hybrid method based on exponential fuzzy time series and learning automata based optimization for stock market…”
    Get full text
    Journal Article
  8. 8

    Development and Validation of Embedded Device for Electrocardiogram Arrhythmia Empowered with Transfer Learning by Asif, Rizwana Naz, Abbas, Sagheer, Khan, Muhammad Adnan, Atta-ur-Rahman, Sultan, Kiran, Mahmud, Maqsood, Mosavi, Amir

    “…With the emergence of the Internet of Things (IoT), investigation of different diseases in healthcare improved, and cloud computing helped to centralize the…”
    Get full text
    Journal Article
  9. 9

    Reversible and Fragile Watermarking for Medical Images by Alqahtani, Abdullah, Aldhafferi, Nahier, Sultan, Kiran, Atta-ur-Rahman, David A., Mahmud, Maqsood

    “…A novel reversible digital watermarking technique for medical images to achieve high level of secrecy, tamper detection, and blind recovery of the original…”
    Get full text
    Journal Article
  10. 10

    Toward Zero Trust Security IN 5G Open Architecture Network Slices by Kholidy, Hisham A., Karam, Andrew, Sidoran, James, Rahman, Mohammad A., Mahmoud, Mohammed, Badr, Mahmoud, Mahmud, Maqsood, Sayed, Ahmed F.

    “…Developing trust in 5G network slicing is an important issue since as mobile networks evolve the number of internal components, network functions, and the use…”
    Get full text
    Conference Proceeding
  11. 11

    Robust and Fragile Medical Image Watermarking: A Joint Venture of Coding and Chaos Theories by Alqahtani, Abdullah, Aldhafferi, Nahier, Musleh, Dhiaa, Sultan, Kiran, Atta-ur-Rahman, David A., Mahmud, Maqsood

    Published in Journal of healthcare engineering (01-01-2018)
    “…A secure spatial domain, hybrid watermarking technique for obtaining watermark (authentication information) robustness and fragility of the host medical image…”
    Get full text
    Journal Article
  12. 12

    Biotransformation of Finasteride by Ocimum sanctum L., and tyrosinase inhibitory activity of transformed metabolites: Experimental and computational insights by Ali, Sajid, Nisar, Muhammad, Iriti, Marcello, Shah, Mohammad Raza, Mahmud, Maqsood, Ali, Ihsan, Khan, Inamullah

    Published in Steroids (15-12-2014)
    “…•Finasteride was transformed by Ocimum sanctum L. culture.•Three metabolites (16β-hydroxyfinasteride, 11α-hydroxyfinasteride and 15β-hydroxyfinasteride) were…”
    Get full text
    Journal Article
  13. 13

    Currencies analysis based on stability using apriori-algorithm by Hameed ULLAH KHAN, Zahid ULLAH, Maqsood MAHMUD

    “…This paper presents the stability of currency that is more stable with respect to other currencies. Various currencies are studied and graphs are plotted with…”
    Get full text
    Journal Article
  14. 14

    A Novel Cybersecurity Framework for Countermeasure of SME's in Saudi Arabia by Ajmi, Lama, Hadeel, Alqahtani, Najla, Ur Rahman, Atta, Mahmud, Maqsood

    “…Cyber security is a core issue of the world. Every country and each organization is trying their best to defend their assets by spending a huge amount of their…”
    Get full text
    Conference Proceeding
  15. 15

    ANALYSIS OF CLOUD COMPUTING SECURITY IN PERSPECTIVE OF SAUDI ARABIA by AlHumaidan, Yara, AlAjmi, Lama, Aljamea, Moudhi, Mahmud, Maqsood

    “…The cloud computing technology provides computing resources as services over the internet. Efficiency and cost-effectiveness are the main drivers for cloud…”
    Get full text
    Conference Proceeding
  16. 16

    Analysis of the Attacks on Saudi Web Companies by Almarri, Deema, Alhazza, Munaira, Aljamea, Moudhi, Mahmud, Maqsood

    “…Critical business relationships could be compromised due to using unprotected website and may affect the business reputation itself. The business's website is…”
    Get full text
    Conference Proceeding
  17. 17

    Kalman Filter Based Multiple Person Head Tracking by Ullah, Mohib, Mahmud, Maqsood, Ullah, Habib, Ahmad, Kashif, Imran, Ali Shariq, Cheikh, Faouzi Alaya

    Published 10-06-2020
    “…For multi-target tracking, target representation plays a crucial rule in performance. State-of-the-art approaches rely on the deep learning-based visual…”
    Get full text
    Journal Article
  18. 18

    A Novel Feedback Knowledge Management System (FKMS) in Educational Perspective by Al Qahtani, Amal, Al Utaibi, Sara, Al Ghamdi, Reem, Al Ghamdi, Samar, Mahmud, Maqsood

    “…The paper introduces a novel knowledge management system, it describes the process of developing a feedback system for schools where we connect students,…”
    Get full text
    Conference Proceeding
  19. 19

    Security Analysis of Firewall Rule Sets in Computer Networks by Khan, Bilal, Khan, Muhammad Khurram, Mahmud, Maqsood, Alghathbar, Khaled S.

    “…Firewalls are the screening gates for the internet/intranet traffic in computer networks. However, deploying a firewall is simply not enough since it needs to…”
    Get full text
    Conference Proceeding
  20. 20

    A Lightweight Secure Data Aggregation Technique for Wireless Sensor Network by Rahman, Sk. Md. Mizanur, Hossain, Mohammad Anwar, Mahmud, Maqsood, Chaudry, Muhammad Imran, Almogren, Ahmad, Alnuem, Mohammed, Alamri, Atif

    “…Wireless sensor network (WSN) consists of resource constraint sensor nodes where nodes (sensors) send data to the base station/sink node and communicate with…”
    Get full text
    Conference Proceeding