Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Fazlullah Umar"'
Autor:
Imdad Ahmad Mian, null Ijaz-ul-Haq, Aamir Anwar, Roobaea Alroobaea, Syed Sajid Ullah, Fahad Almansour, Fazlullah Umar
Publikováno v:
Complexity, Vol 2022 (2022)
Measuring and evaluating a learner’s learning ability is always the focus of every person whose aim is to develop strategies and plans for their learners to improve the learning process. For example, classroom assessments, self-assessment using com
Externí odkaz:
https://doaj.org/article/a2adfe2a871d4910948472510d50eed0
Autor:
Ch Anwar ul Hassan, Muhammad Sufyan Khan, Rizwana Irfan, Jawaid Iqbal, Saddam Hussain, Syed Sajid Ullah, Roobaea Alroobaea, Fazlullah Umar
Publikováno v:
Computational Intelligence and Neuroscience. 2022:1-20
Effective software cost estimation significantly contributes to decision-making. The rising trend of using nature-inspired meta-heuristic algorithms has been seen in software cost estimation problems. The constructive cost model (COCOMO) method is a
A Machine Learning in Binary and Multiclassification Results on Imbalanced Heart Disease Data Stream
Autor:
Danish Hamid, Syed Sajid Ullah, Jawaid Iqbal, Saddam Hussain, Ch. Anwar ul Hassan, Fazlullah Umar
Publikováno v:
Journal of Sensors
In medical filed, predicting the occurrence of heart diseases is a significant piece of work. Millions of healthcare-related complexities that have remained unsolved up until now can be greatly simplified with the help of machine learning. The propos
Autor:
Israr Hussain, Dostdar Hussain, Rashi Kohli, Muhammad Ismail, Saddam Hussain, Syed Sajid Ullah, Roobaea Alroobaea, Wajid Ali, Fazlullah Umar
Publikováno v:
Mobile Information Systems
Image recaptured from a high-resolution LED screen or a good quality printer is difficult to distinguish from its original counterpart. The forensic community paid less attention to this type of forgery than to other image alterations such as splicin
Autor:
Muhammad Zakir Khan, Rashid Naseem, Aamir Anwar, Ijaz ul-Haq, Saddam Hussain, Roobaea Alroobaea, Syed Sajid Ullah, Fazlullah Umar
Publikováno v:
Repositorio Abierto de la UdL
Universitad de Lleida
Universitad de Lleida
Complex software systems, meant to facilitate organizations, undergo frequent upgrades that can erode the system architectures. Such erosion makes understandability and maintenance a challenging task. To this end, software modularization provides an
Autor:
Aamir Anwar, Ijaz Ul Haq, Imdad Ahmad Mian, Fadia Shah, Roobaea Alroobaea, Saddam Hussain, Syed Sajid Ullah, Fazlullah Umar
Publikováno v:
Repositorio Abierto de la UdL
Universitad de Lleida
Mobile Information Systems
Universitad de Lleida
Mobile Information Systems
An intelligent tutoring system (ITS) is a computer system or software application that is built to replicate human tutors by supporting the theory of “learning by doing.” Even though ITSs have been proven to be successful in academic studies, the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::479be710e160cb6f95d2c0a7ac9d89d3
https://repository.uwl.ac.uk/id/eprint/9205/1/Anwar_et_al._2022_mis._Applying_real-time_dynamic_scaffolding_techniques_during_tutoring_sessions_using_intelligent_tutoring_systems.pdf
https://repository.uwl.ac.uk/id/eprint/9205/1/Anwar_et_al._2022_mis._Applying_real-time_dynamic_scaffolding_techniques_during_tutoring_sessions_using_intelligent_tutoring_systems.pdf
Autor:
Muhammad Naveed, Fahim Arif, Syed Muhammad Usman, Aamir Anwar, Myriam Hadjouni, Hela Elmannai, Saddam Hussain, Syed Sajid Ullah, Fazlullah Umar
Publikováno v:
Wireless Communications & Mobile Computing
An intrusion detection system, often known as an IDS, is extremely important for preventing attacks on a network, violating network policies, and gaining unauthorized access to a network. The effectiveness of IDS is highly dependent on data preproces
Autor:
Wajid Ali, Mehboob Ali, Israr Hussain, Syed Sajid Ullah, Roobaea Alroobaea, Saddam Hussain, Ahmed Binmahfoudh, Fazlullah Umar
Publikováno v:
Journal of Sensors
The goal of this paper is to design a new correlation coefficient for T -spherical fuzzy sets (TSFSs), which can accurately measure the nature of correlation (i.e., positive and negative) as well as the degree of relationship between TSFS. In order t
Autor:
Muhammad Siraj Rathore, Naveed Ahmad, Rashi Kohli, Jawaid Iqbal, Roobaea Alroobaea, Saddam Hussain, Syed Sajid Ullah, Fazlullah Umar
Publikováno v:
Wireless Communications & Mobile Computing
The trend of consolidating network functions from specialized hardware to software running on virtualization servers brings significant advantages for reducing costs and simplifying service deployment. However, virtualization techniques have signific
Autor:
Musaad Darwish AlGarni, Roobaea AlRoobaea, Jasem Almotiri, Syed Sajid Ullah, Saddam Hussain, Fazlullah Umar
Publikováno v:
Wireless Communications & Mobile Computing
Rising prevalence of malicious software (malware) attacks represent a serious threat to online safety in the modern era. Malware is a threat to anyone who uses the Internet since it steals data and causes damage to computer systems. In addition, the