Search

Your search keyword '"Muhammad Khurram"' showing total 3,847 results

Search Constraints

Start Over You searched for: Author "Muhammad Khurram" Remove constraint Author: "Muhammad Khurram"
3,847 results on '"Muhammad Khurram"'

Search Results

51. Current practices of urologists regarding intravesical therapy use for non-muscle-invasive bladder cancer patients.

52. A Lightweight Convolutional Neural Network to Predict Steering Angle for Autonomous Driving Using CARLA Simulator

53. Analysis of COVID-19 Mortality in Allied Hospitals of Rawalpindi Medical University Pakistan

54. Feasibility of miscible CO2 flooding in hydrocarbon reservoirs with different crude oil compositions

55. Comprehensive Survey on Big Data Privacy Protection

56. WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks

57. Performance Analysis of the Probabilistic Models of ISM Data Traffic in Cognitive Radio Enabled Radio Environments

58. Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks

59. Meet the Sherlock Holmes’ of Side Channel Leakage: A Survey of Cache SCA Detection Techniques

60. Comprehensive Review of Cybercrime Detection Techniques

61. IEEE Access Special Section Editorial: Mobile Edge Computing and Mobile Cloud Computing: Addressing Heterogeneity and Energy Issues of Compute and Network Resources

63. Hand-based multibiometric systems: state-of-the-art and future challenges

64. Plastic Waste Management through the Development of a Low Cost and Light Weight Deep Learning Based Reverse Vending Machine

65. Rapid Testing System for Rice Quality Control through Comprehensive Feature and Kernel-Type Detection

66. Pharmacological Properties of 4′, 5, 7-Trihydroxyflavone (Apigenin) and Its Impact on Cell Signaling Pathways

67. Epidemiological Survey of the Prevalence of HCV and HBV among the Factory Workers in the Periphery of Lahore

68. COMPARISON OF EXPRESSION OF E-CADHERIN IN ORAL PSEUDOEPITHELIOMATOUS HYPERPLASIA AND ORAL SQUAMOUS CELL CARCINOMA

69. Impact of Green Supply Chain Management Practices on Corporate Image: Mediating role of Green Communications

70. Investigation of change in different properties of sandstone and dolomite samples during matrix acidizing using chelating agents

71. Trust Management Techniques for the Internet of Things: A Survey

72. Energy Efficiency in Multipath Rayleigh Faded Wireless Sensor Networks Using Collaborative Communication

73. The Internet of Things: A Review of Enabled Technologies and Future Challenges

74. Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement Learning Technique

75. SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm

76. Questioning Key Compromise Attack on Ostad-Sharif et al.’s Authentication and Session key Generation Scheme for Healthcare Applications

77. A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions

78. Comparison of CNNs and Vision Transformers-Based Hybrid Models Using Gradient Profile Loss for Classification of Oil Spills in SAR Images

79. Navigating Cybersecurity Training: A Comprehensive Review

80. Implementation and Evaluation of a Social Media-Based Communication Strategy to Enhance Employee Engagement: Experiences From a Children's Hospital, Pakistan

81. Investigation of Spectral Properties of DBR-Based Photonic Crystal Structure for Optical Filter Application

82. Design of Two-Mode Spectroscopic Sensor for Biomedical Applications: Analysis and Measurement of Relative Intensity Noise through Control Mechanism

83. Prediction of Surface Roughness as a Function of Temperature for SiO2 Thin-Film in PECVD Process

84. A Deep Learning-Based Sensor Modeling for Smart Irrigation System

85. Designing a Recombinant Vaccine against Providencia rettgeri Using Immunoinformatics Approach

86. Human Resource Management practices: a case Study of the Dr. Mahmud Husain Library, University of Karachi

88. Selection of an industrial boiler for a soda-ash production plant using analytical hierarchy process and TOPSIS approaches

92. A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service

93. Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols

94. A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems

95. A Newly Developed Ground Truth Dataset for Visual Saliency in Videos

96. CloudProcMon: A Non-Intrusive Cloud Monitoring Framework

97. Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare

98. Detection of Anti-Echinococcus granulosus Antibodies in Humans: An Update from Pakistan

99. CBCIoT: A Consensus Algorithm for Blockchain-Based IoT Applications

100. A Remotely Deployable Wind Sonic Anemometer

Catalog

Books, media, physical & digital resources