Search Results - "Mahmud, Maqsood"
-
1
Frequency based feature selection method using whale algorithm
Published in Genomics (San Diego, Calif.) (01-12-2019)“…Feature selection is the problem of finding the best subset of features which have the most impact in predicting class labels. It is noteworthy that…”
Get full text
Journal Article -
2
Evolutionary-based image encryption using RNA codons truth table
Published in Optics and laser technology (01-01-2020)“…•The ribonucleic acid (RNA) concepts and genetic algorithm (GA) are used for high secure image encryption.•GA employs logistic map and RNA to generate its…”
Get full text
Journal Article -
3
A hybrid model based on differential fuzzy logic relationships and imperialist competitive algorithm for stock market forecasting
Published in Applied soft computing (01-03-2016)“…[Display omitted] •A differential fuzzy time series model is defined for forecast inside trend data.•The differential fuzzy logical relationships and groups…”
Get full text
Journal Article -
4
Adoption of open innovation and entrepreneurial orientation practices in Malaysian furniture industry
Published in Entrepreneurial Business and Economics Review (01-06-2022)“…Objective: The main objective of this research is to integrate the resource-based view (RBV) to analyse how the relationship between firm performance and…”
Get full text
Journal Article -
5
The impact of cyberattacks awareness on customers’ trust and commitment: an empirical evidence from the Pakistani banking sector
Published in Information and computer security (16-11-2023)“…Purpose The banking industry has always been vulnerable to cyberattacks. In recent years, Pakistan’s banking sector experienced the most intense cyberattack in…”
Get full text
Journal Article -
6
Combining ARFIMA models and fuzzy time series for the forecast of long memory time series
Published in Neurocomputing (Amsterdam) (29-01-2016)“…Long memory time series are stationary processes in which there is a statistical long range dependency between the current value and values in different times…”
Get full text
Journal Article -
7
Stock market forecasting by using a hybrid model of exponential fuzzy time series
Published in International journal of approximate reasoning (01-03-2016)“…The initial aim of this study is to propose a hybrid method based on exponential fuzzy time series and learning automata based optimization for stock market…”
Get full text
Journal Article -
8
Development and Validation of Embedded Device for Electrocardiogram Arrhythmia Empowered with Transfer Learning
Published in Computational intelligence and neuroscience (07-10-2022)“…With the emergence of the Internet of Things (IoT), investigation of different diseases in healthcare improved, and cloud computing helped to centralize the…”
Get full text
Journal Article -
9
Reversible and Fragile Watermarking for Medical Images
Published in Computational and mathematical methods in medicine (01-01-2018)“…A novel reversible digital watermarking technique for medical images to achieve high level of secrecy, tamper detection, and blind recovery of the original…”
Get full text
Journal Article -
10
Toward Zero Trust Security IN 5G Open Architecture Network Slices
Published in MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (28-11-2022)“…Developing trust in 5G network slicing is an important issue since as mobile networks evolve the number of internal components, network functions, and the use…”
Get full text
Conference Proceeding -
11
Robust and Fragile Medical Image Watermarking: A Joint Venture of Coding and Chaos Theories
Published in Journal of healthcare engineering (01-01-2018)“…A secure spatial domain, hybrid watermarking technique for obtaining watermark (authentication information) robustness and fragility of the host medical image…”
Get full text
Journal Article -
12
Biotransformation of Finasteride by Ocimum sanctum L., and tyrosinase inhibitory activity of transformed metabolites: Experimental and computational insights
Published in Steroids (15-12-2014)“…•Finasteride was transformed by Ocimum sanctum L. culture.•Three metabolites (16β-hydroxyfinasteride, 11α-hydroxyfinasteride and 15β-hydroxyfinasteride) were…”
Get full text
Journal Article -
13
Currencies analysis based on stability using apriori-algorithm
Published in Annals of "Spiru Haret" University. Economic Series (English ed.) (01-06-2010)“…This paper presents the stability of currency that is more stable with respect to other currencies. Various currencies are studied and graphs are plotted with…”
Get full text
Journal Article -
14
A Novel Cybersecurity Framework for Countermeasure of SME's in Saudi Arabia
Published in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) (01-05-2019)“…Cyber security is a core issue of the world. Every country and each organization is trying their best to defend their assets by spending a huge amount of their…”
Get full text
Conference Proceeding -
15
ANALYSIS OF CLOUD COMPUTING SECURITY IN PERSPECTIVE OF SAUDI ARABIA
Published in 2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom) (01-09-2018)“…The cloud computing technology provides computing resources as services over the internet. Efficiency and cost-effectiveness are the main drivers for cloud…”
Get full text
Conference Proceeding -
16
Analysis of the Attacks on Saudi Web Companies
Published in 2018 21st Saudi Computer Society National Computer Conference (NCC) (01-04-2018)“…Critical business relationships could be compromised due to using unprotected website and may affect the business reputation itself. The business's website is…”
Get full text
Conference Proceeding -
17
Kalman Filter Based Multiple Person Head Tracking
Published 10-06-2020“…For multi-target tracking, target representation plays a crucial rule in performance. State-of-the-art approaches rely on the deep learning-based visual…”
Get full text
Journal Article -
18
A Novel Feedback Knowledge Management System (FKMS) in Educational Perspective
Published in 2017 Second International Conference on Information Systems Engineering (ICISE) (01-04-2017)“…The paper introduces a novel knowledge management system, it describes the process of developing a feedback system for schools where we connect students,…”
Get full text
Conference Proceeding -
19
Security Analysis of Firewall Rule Sets in Computer Networks
Published in 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (01-07-2010)“…Firewalls are the screening gates for the internet/intranet traffic in computer networks. However, deploying a firewall is simply not enough since it needs to…”
Get full text
Conference Proceeding -
20
A Lightweight Secure Data Aggregation Technique for Wireless Sensor Network
Published in 2014 IEEE International Symposium on Multimedia (01-12-2014)“…Wireless sensor network (WSN) consists of resource constraint sensor nodes where nodes (sensors) send data to the base station/sink node and communicate with…”
Get full text
Conference Proceeding