Search

Your search keyword '"Habib Ullah Khan"' showing total 292 results

Search Constraints

Start Over You searched for: Author "Habib Ullah Khan" Remove constraint Author: "Habib Ullah Khan"
292 results on '"Habib Ullah Khan"'

Search Results

1. Building integrated assessment model for IoT technology deployment in the Industry 4.0

2. Optimizing marine vehicles industry: a hybrid analytical hierarchy process and additive ratio assessment approach for evaluating and selecting IoT-based marine vehicles

3. Modeling security evaluation framework for IoHT-driven systems using integrated decision-making methodology

4. Identifying the AI-based solutions proposed for restricting Money Laundering in Financial Sectors: Systematic Mapping

5. A comprehensive survey on exploring and analyzing COVID-19 mobile apps: Meta and exploratory analysis

6. A comprehensive study on unraveling the advances of immersive technologies (VR/AR/MR/XR) in the healthcare sector during the COVID-19: Challenges and solutions

7. Adjuvant Per-Operative Triamcinolone use in Lumbar Disc Surgery to Alleviate Post-Operative Pain

8. New Dimensions for Physical Layer Secret Key Generation: Excursion Lengths-Based Key Generation

9. IoT platforms assessment methodology for COVID-19 vaccine logistics and transportation: a multi-methods decision making model

10. Role of authentication factors in Fin-tech mobile transaction security

11. Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review

12. The Discrete and Irregular Rhetorical Effects Of Huruf Jarrah (Prepositions): A Case Study

13. Use of Per-Operative Angiogram and Doppler Ultrasound as an Adjunct to Assess the Cerebral Vessels Following Aneurysmal Brain Surgery

14. Utilizing Bio Metric System for Enhancing Cyber Security in Banking Sector: A Systematic Analysis

15. Systematic analysis of healthcare big data analytics for efficient care and disease diagnosing

16. The Pre-operative Embolization of Meningioma Leads to Reduced Operating Time and Less Intraoperative Bleeding

17. Grid voltage sensor fault‐tolerant control for single‐phase two‐level PWM rectifier

18. Utilizing the collective wisdom of fintech in the gcc region: A systematic mapping approach

19. Toward explainable AI-empowered cognitive health assessment

20. Intelligent Decision Support Systems—An Analysis of Machine Learning and Multicriteria Decision-Making Methods

21. Taking FANET to Next Level

22. A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method

23. Features-Based IoT Security Authentication Framework Using Statistical Aggregation, Entropy, and MOORA Approaches

24. Systematic Literature Review on Security Risks and its Practices in Secure Software Development

25. An optimized algorithm for optimal power flow based on deep learning

26. Wind farms selection using geospatial technologies and energy generation capacity in Gwadar

27. An efficient approach for textual data classification using deep learning

28. Ensemble deep learning for brain tumor detection

29. A Service-Efficient Proxy Mobile IPv6 Extension for IoT Domain

30. A Novel Deep Learning and Ensemble Learning Mechanism for Delta-Type COVID-19 Detection

31. Efficient Power Grid Management Using Sliced-Based Mechanism for Systematic Allocation of Solar Energy Resources: A Conceptual Framework

32. Prioritizing the Issues extracted for Getting Right People on Right Project in Software Project Management From Vendors’ Perspective

33. Making the Sourcing Decision of Software Maintenance and Information Technology

34. Systematic Mapping Study on Security Approaches in Secure Software Engineering

35. Analysis of Navigation Assistants for Blind and Visually Impaired People: A Systematic Review

36. An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm

37. Empirical Investigation of Influencing Factors Regarding Offshore Outsourcing Decision of Application Maintenance

38. Design and Analysis of Lightweight Authentication Protocol for Securing IoD

39. Green-Agile Maturity Model: An Evaluation Framework for Global Software Development Vendors

40. Challenges and Practices Identification via a Systematic Literature Review in the Adoption of Green Cloud Computing: Client’s Side Approach

41. Role of Critical Success Factors in Offshore Quality Requirement Change Management Using SLR

42. Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone

43. D2D-V2X-SDN: Taxonomy and Architecture Towards 5G Mobile Communication System

44. Empirical Investigation of Critical Requirements Engineering Practices for Global Software Development

45. A Comprehensive Analysis of Healthcare Big Data Management, Analytics and Scientific Programming

46. Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review

47. Recognition of Different Types of Leukocytes Using YOLOv2 and Optimized Bag-of-Features

48. Big Data Velocity Management–From Stream to Warehouse via High Performance Memory Optimized Index Join

49. Analyzing Factors That Influence Offshore Outsourcing Decision of Application Maintenance

50. Deep Semantic Segmentation and Multi-Class Skin Lesion Classification Based on Convolutional Neural Network

Catalog

Books, media, physical & digital resources