Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Muhammad Akram Shaikh"'
Publikováno v:
Mehran University Research Journal of Engineering and Technology, Vol 31, Iss 4, Pp 599-612 (2012)
Mining research community on the basis of hidden relationships present between its entities is important from academic recommendation point of view. Previous approaches discovered research community by using network connectivity based distance meas
Externí odkaz:
https://doaj.org/article/d31d587a289b4c8a83ec99e8dcc1d3fb
Publikováno v:
Mehran University Research Journal of Engineering and Technology, Vol 30, Iss 4, Pp 591-600 (2011)
This paper presents the comparison of unregulated emissions such as carbonyls and BTEX (Benzene, Toluene, Ethyl Benzene, and Xylenes) species emanated from a light duty SI (Spark Ignition) vehicle E-0 (fuelled on gasoline) and E-10 (ethanol-gasoline
Externí odkaz:
https://doaj.org/article/59f04bfd733b4aa2af2c09008629de72
Publikováno v:
3C Tecnología_Glosas de innovación aplicadas a la pyme. :366-383
The analysis of data generated by higher educational institutes has the potential of revealing interesting facets of student learning behavior. Classification is a popularly explored area in Educational Data Mining for predicting student performance.
Autor:
Imran Memon, Asma Zubedi, Aisha Ashraf, Zhongliang Deng, Jichao Jiao, Usman Ali Arain, Muhammad Akram Shaikh, Muhammad Aslam Uqaili, Qasim Ali Arain
Publikováno v:
Wireless Personal Communications. 95:411-428
The collection of information is one of the most crucial processes in many internet-enabled applications for multiple mix-zones over road networks. It is essential to use road networks for prolonged time duration in an energy efficient manner. Howeve
Publikováno v:
2018 5th International Multi-Topic ICT Conference (IMTIC).
As a student embarks on an educational journey, several factors influence his/her behavior and overall class performance. This paper presents the capabilities of Educational Data Mining (EDM), specifically the use of Association Rule Mining and Patte
Publikováno v:
2008 23rd International Symposium on Computer and Information Sciences.
High-precision localization is one of the important applications in the field of computer vision. In this paper a high-precision template localization algorithm based on SIFT (scale invariant feature transform) is presented. The proposed method is co
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540773672
ICHIT
ICHIT
After the tragic events of 9/11, the concern about national security has increased significantly. However, law enforcement agencies, particularly in view of current emphasis on terrorism, increasingly face the challenge of information overload and la
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3736568811308e924e79d0ffb0dcd7e6
https://doi.org/10.1007/978-3-540-77368-9_4
https://doi.org/10.1007/978-3-540-77368-9_4
Publikováno v:
Advanced Data Mining and Applications ISBN: 9783540738701
ADMA
ADMA
Law enforcement agencies and intelligence analysts frequently face the problems of identifying the actor importance and possible roles among a specific group of entities in a terrorist network. However, such tasks can be fairly time consuming and lab
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b7b6e828f78a32df81474e59adec7fd4
https://doi.org/10.1007/978-3-540-73871-8_54
https://doi.org/10.1007/978-3-540-73871-8_54
Autor:
Muhammad Akram Shaikh, Wang Jiaxin
Publikováno v:
2006 IEEE International Multitopic Conference.
The concern about national security has increased significantly since the 9/11 attacks. However, information overload and lack of advanced, automated techniques hinders the effective analysis of criminal and terrorist activities. Data mining applied
Autor:
Wang Jiaxin, Muhammad Akram Shaikh
Publikováno v:
2006 International Conference on Emerging Technologies.
The network structure of a group determines its strengths and weaknesses. A general knowledge of the prevalent models of terrorist organizations and its analysis methods leads to a better understanding of their capabilities. One important method is c