2,481 results on '"H. Mahmoud"'
Search Results
2. Mask-UnMask Regions (MUMR) Framework for Classifying AMD Grades Using Inter-Regional Interaction Analysis.
3. The odds of having obesity in Egyptian children with autism spectrum disorders is higher than stunting compared to healthy developing peers: a national survey
4. Reflective Writing among Healthcare Practitioners in Primary Care: A Qualitative Study from Qatar
5. Groundnut shell ash as a partial replacement of cement in sandcrete blocks production
6. A Comprehensive Review of Generative AI Applications in 6G.
7. Data-driven Approach for Optimising Resource Allocation of O-RAN Networks.
8. A COVID-19 CXR Image Recognition Method Based on Deep Transfer Learning.
9. Machine Learning-based Spectrum Allocation using Cognitive Radio Networks.
10. Tram Air Conditioning Fault Prediction Using Machine Learning.
11. Zunna - The Browser Extension for Protecting Personal Data.
12. Customer Segmentation for Telecommunication Using Machine Learning.
13. A Prediction Model for Short Price Jump in Cryptocurrency Market.
14. Optimized GPU Implementation of Grid Refinement in Lattice Boltzmann Method.
15. Transfer Learning-Based Deep Learning Model for Corn Leaf Disease Classification.
16. Cooperative Spectrum Sensing with Machine Learning Approaches in Cognitive Radio Networks for IoMT Applications.
17. Intelligent Network Optimisation for Beyond 5G Networks Considering Packet Drop Rate.
18. QoS Provisioning and Resource Block Management in AI-Enabled Networks.
19. Modeling to medical and economic data using: The transmuted power unit inverse Lindley distribution
20. A Systematic Review of Blockchain-Based Privacy-Preserving Reputation Systems for IoT Applications.
21. Advanced Security Framework for 6G Networks: Integrating Deep Learning and Physical Layer Security.
22. Novel compressed linear network coding vectors for multihop communication networks.
23. A Framework for LLM-Assisted Smart Policing System.
24. A survey on blockchain technology in the maritime industry: Challenges and future perspectives.
25. Building Trust in Deep Learning Models via a Self- Interpretable Visual Architecture.
26. A Task Scheduler for Mobile Edge Computing Using Priority-based Reinforcement Learning.
27. Intrusion Detection for Wireless Sensor Network Using Graph Neural Networks.
28. A Robust Scheduling Algorithm for Overload-Tolerant Real-Time Systems.
29. Smart Industrial Safety using Computer Vision.
30. Design and Development of Policy Enforcement for the Privacy by Design Framework.
31. A Blockchain-Based Solution for Defining and Enforcing Personal Data Access Policies.
32. Accelerated Hydration Site Localization and Thermodynamic Profiling.
33. Enhancing Security Awareness Through Gamified Approaches.
34. Analysing biosensor clinical pathogen information using mayfly optimized convolute neural network approach.
35. Time-Frequency Connectedness between Shariah Indices in a Systemic Crisis Era.
36. An automatic detection system of diabetic retinopathy using a hybrid inductive machine learning algorithm.
37. Integrated Deep Learning and Stochastic Models for Accurate Segmentation of Lung Nodules From Computed Tomography Images: A Novel Framework.
38. Bridging the Reality Gap Between Virtual and Physical Environments Through Reinforcement Learning.
39. A Framework for Decentralized, Real-Time Reputation Aggregation in IoV.
40. Deep Learning Model for Efficient Protein-Ligand Docking with Implicit Side-Chain Flexibility.
41. A Container-Based Architecture to Build and Deploy Applications within a Social Network.
42. Evaluation of Failure Analysis of IoT Applications Using Edge-Cloud Architecture.
43. Neon: A Multi-GPU Programming Model for Grid-based Computations.
44. An Anomaly Detection Model for IoT Networks based on Flow and Flag Features using a Feed-Forward Neural Network.
45. Multi-Objective Differential Evolution and Unseen Adversarial Sample Generation.
46. A Machine Learning Approach to Predict System-Level Threats from Hardware-Based Fault Injection Attacks on IoT Software.
47. A Machine Learning Based Approach to Detect Fault Injection Attacks in IoT Software Systems.
48. Evaluation of Techniques for Sim2Real Reinforcement Learning.
49. Evaluation of GAN Architectures for Adversarial Robustness of Convolution Classifier.
50. Enhancing Performance of Continuous-Variable Quantum Key Distribution (CV-QKD) and Gaussian Modulation of Coherent States (GMCS) in Free-Space Channels under Individual Attacks with Phase-Sensitive Amplifier (PSA) and Homodyne Detection (HD).
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.