Search Results - "Saeed, Soobia"
-
1
New techniques for efficiently k-NN algorithm for brain tumor detection
Published in Multimedia tools and applications (01-05-2022)“…The k- NN algorithm missing values is one of the current research issues, especially in 4D frequency. This study addresses the accuracy of the images,…”
Get full text
Journal Article -
2
Improve correlation matrix of Discrete Fourier Transformation technique for finding the missing values of MRI images
Published in Mathematical biosciences and engineering : MBE (01-09-2022)“…Missing values in the k-NN algorithm are a significant research concern, especially in low-grade tumours and CSF fluid, which are commonly identified in MRI…”
Get full text
Journal Article -
3
Assurance due to the Usage of Two ERP Methods: Microsoft Dynamics AX and SAP
Published in Mehran University Research Journal of Engineering and Technology (01-04-2018)“…A speculation-based resource organising technique aids agencies in routing information across many industrial components. Organisation functions through IT…”
Get full text
Journal Article -
4
Analysis of Brain Tumors Due to the Usage of Mobile Phones
Published in Mehran University Research Journal of Engineering and Technology (01-07-2017)“…The impact of cellular phone radiation on human health is the subject of current mindfulness and is an outcome of the huge increase in phone usage throughout…”
Get full text
Journal Article -
5
Head injury management in road accident patients: a case report
Published in Journal of Islamabad Medical and Dental College (Online) (16-09-2024)“…Objective: To examine recovery outcomes for patients with head injuries from road traffic accidents (RTAs), focusing on neurosurgical care. Methodology: We…”
Get full text
Journal Article -
6
Online Deal Portal: Factors to Consider for an Effective Design
Published in University of Sindh journal of information and communication technology (Online) (01-03-2020)“…In this research paper we discuss about the relationship between online deals portals and consumers and how it affects an efficient deals portal design…”
Get full text
Journal Article -
7
Systems Development Life Cycle Test Driven Technique and Defect investigation
Published in University of Sindh journal of information and communication technology (Online) (01-07-2019)“…Software testing is essential to build and improve programming. Software testing is the basic order of construction software. Testing is undoubtedly expensive…”
Get full text
Journal Article -
8
Systems Development Life Cycle Test Driven Technique and Defect investigation
Published in University of Sindh journal of information and communication technology (Online) (01-07-2019)“…Software testing is essential to build and improve programming. Software testing is the basic order of construction software. Testing is undoubtedly expensive…”
Get full text
Journal Article -
9
Analysis of Software Development Methodologies
Published in International Journal of Computing and Digital System (Jāmiʻat al-Baḥrayn. Markaz al-Nashr al-ʻIlmī) (01-09-2019)“…The researcher focuses on the analysis of most common diverse methodologies of software development to choose the best one on the basis of different factors…”
Get full text
Journal Article -
10
Assurance using two erp: Microsoft dynamics ax and sap due to the usage of supply chain management module
Published in Mehran University research journal of engineering and technology (01-04-2018)“…A speculation-based resource organising technique aids agencies in routing information across many industrial components. Organisation functions through IT…”
Get full text
Journal Article -
11
Evaluating the Quality of Point of Sale (POS) Software
Published in University of Sindh journal of information and communication technology (Online) (01-05-2019)“…Businesses are progressively adopting the Point of Sale (POS) system. This system has a wide range of use which includes; inventory management, sales…”
Get full text
Journal Article -
12
Investigation of a Brain Cancer with Interfacing of 3-Dimensional Image Processing
Published in 2019 International Conference on Information Science and Communication Technology (ICISCT) (01-03-2019)“…3dimensional image analysis (3-D) provides an effective way to quickly and accurately evaluate complex interactions and functions between neurons. Method of…”
Get full text
Conference Proceeding -
13
Ransomware: A Framework for Security Challenges in Internet of Things
Published in 2020 2nd International Conference on Computer and Information Sciences (ICCIS) (13-10-2020)“…With the increasing volume of smartphones, computers, and sensors in the Internet of Things (IoT) model, enhancing security and preventing ransom attacks have…”
Get full text
Conference Proceeding