Zobrazeno 1 - 10
of 89
pro vyhledávání: '"Jan Zahoor"'
Autor:
Khan Habib, Jan Zahoor, Ullah Inam, Alwabli Abdullah, Alharbi Faisal, Habib Shabana, Islam Muhammad, Shin Byung-Joo, Lee Mi Young, Koo JaKeoung
Publikováno v:
Nanotechnology Reviews, Vol 13, Iss 1, Pp 4865-18 (2024)
The emergence of smart and nanobiosensor (NB) technologies has transformed the monitoring and management of bacterial infections. These developments offer remarkable accuracy and precision for detecting infectious pathogens. Smart artificial intellig
Externí odkaz:
https://doaj.org/article/396814f07638426d82108a02f814e394
Autor:
Kolaczinski Jan H, Muhammad Nasir, Khan Qaiser S, Jan Zahoor, Rehman Naveeda, Leslie Toby J, Rowland Mark
Publikováno v:
Malaria Journal, Vol 3, Iss 1, p 15 (2004)
Abstract Background Introducing sustainability and self-reliance is essential in chronic humanitarian emergencies before financial assistance is phased out. In Pakistan-based Afghan refugee camps, this was attempted through shifting from indoor resid
Externí odkaz:
https://doaj.org/article/719cfcbc9ce8487985e2e6ed3d224426
Publikováno v:
In Neurocomputing 7 May 2023 533:178-190
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
In Computers and Electrical Engineering January 2022 97
Publikováno v:
Sindh University Research Journal-SURJ (Science Series) 47.4 (2015)
Image Steganography is a growing research area of information security where secret information is embedded in innocent-looking public communication. This paper proposes a novel crystographic technique for grayscale images in spatial domain. The secr
Externí odkaz:
http://arxiv.org/abs/1601.01386
Publikováno v:
Technical Journal, University of Engineering and Technology Taxila, Pakistan, vol.20, pp.48-53, 2015
Wireless Sensor Networks (WSNs) are memory and bandwidth limited networks whose main goals are to maximize the network lifetime and minimize the energy consumption and transmission cost. To achieve these goals, dif ferent techniques of compression an
Externí odkaz:
http://arxiv.org/abs/1510.00226
Publikováno v:
Technical Journal, University of Engineering and Technology Taxila, Pakistan, vol. 19, pp. 57-64, 2014
Information Security is a major concern in today's modern era. Almost all the communicating bodies want the security, confidentiality and integrity of their personal data. But this security goal cannot be achieved easily when we are using an open net
Externí odkaz:
http://arxiv.org/abs/1502.07808
Publikováno v:
World Applied Sciences Journal, vol. 31(6), pp. 1207-1213, 2014
Retrieving similar images from a large dataset based on the image content has been a very active research area and is a very challenging task. Studies have shown that retrieving similar images based on their shape is a very effective method. For this
Externí odkaz:
http://arxiv.org/abs/1406.3949
Real world datasets are sparse, dirty and contain hundreds of items. In such situations, discovering interesting rules (results) using traditional frequent itemset mining approach by specifying a user defined input support threshold is not appropriat
Externí odkaz:
http://arxiv.org/abs/0904.3319