46 results on '"Mahmud, Maqsood"'
Search Results
2. Kalman Filter Based Multiple Person Head Tracking
3. Impact on Teaching Strategies in Saudi Arabian Universities Owing to COVID-19 Pandemic
4. Flood-Prediction Techniques Based on Geographical Information System Using Wireless Sensor Networks
5. Evolutionary-based image encryption using RNA codons truth table
6. A Game-Theoretic Approach to Safe Crowd Evacuation in Emergencies
7. Detection of Criminally Convicted Email Users by Behavioral Dissimilarity
8. A hybrid model based on differential fuzzy logic relationships and imperialist competitive algorithm for stock market forecasting
9. Stock market forecasting by using a hybrid model of exponential fuzzy time series
10. Machine Learning Approach to Users’ Age Prediction: A Telecom Company Case Study in Saudi Arabia.
11. Toward Zero Trust Security IN 5G Open Architecture Network Slices
12. Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy Conservation
13. Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding)
14. Assessment of Information Extraction Techniques, Models and Systems
15. SUNFIT: A Machine Learning-Based Sustainable University Field Training Framework for Higher Education.
16. Network Anomaly Detection in 5G Networks
17. A Deep Two-State Gated Recurrent Unit for Particulate Matter (PM2.5) Concentration Forecasting
18. Adoption of open innovation and entrepreneurial orientation practices in Malaysian furniture industry
19. Detection of Criminally Convicted Email Users by Behavioral Dissimilarity
20. Development and Validation of Embedded Device for Electrocardiogram Arrhythmia Empowered with Transfer Learning.
21. Biotransformation of Finasteride by Ocimum sanctum L., and tyrosinase inhibitory activity of transformed metabolites: Experimental and computational insights
22. Information Security in Business: A Bibliometric Analysis of the 100 Top Cited Articles
23. Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy Conservation
24. A Deep Two-State Gated Recurrent Unit for Particulate Matter (PM2.5) Concentration Forecasting.
25. Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding)
26. Combinatorial Optimization for Multi-Target Tracking
27. CROWD CONGESTION DETECTION IN VIDEOS
28. HEAD BASED TRACKING
29. Frequency based feature selection method using whale algorithm
30. ANALYSIS OF CLOUD COMPUTING SECURITY IN PERSPECTIVE OF SAUDI ARABIA
31. Robust and Fragile Medical Image Watermarking: A Joint Venture of Coding and Chaos Theories
32. Analysis of the Attacks on Saudi Web Companies
33. A Novel Feedback Knowledge Management System (FKMS) in Educational Perspective
34. Combining ARFIMA models and fuzzy time series for the forecast of long memory time series
35. A Lightweight Secure Data Aggregation Technique for Wireless Sensor Network
36. Currencies analysis based on stability using apriori-algorithm
37. Gray Level Image Hiding by Using Mackey-Glass Series
38. A Novel Method for Outlier Entity Detection in Email Communication Network (ECN).
39. Efficient Securing of Iris Image Template by Using Grayscale Level Incremented/Decremented Method
40. Security Analysis of Firewall Rule Sets in Computer Networks
41. Currencies Analysis Based on Stability: Using Apriori-Algorithm
42. Development of symmetric cryptosystem using matrices with less overhead on communication channel
43. Bio-chaotic Stream Cipher-Based Iris Image Encryption
44. Most known vulnerabilities in Saudi Arabian web servers
45. Intrinsic Authentication of Multimedia Objects Using Biometric Data Manipulation.
46. Reversible and Fragile Watermarking for Medical Images.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.