Zobrazeno 1 - 10
of 62
pro vyhledávání: '"Murtaza Ahmed"'
Autor:
Mitchell S. von Itzstein, Yuqiu Yang, Yiqing Wang, David Hsiehchen, Thomas Y. Sheffield, Farjana Fattah, Vinita Popat, Murtaza Ahmed, Jade Homsi, Jonathan E. Dowell, Sawsan Rashdan, Jay Lohrey, Hans J. Hammers, Randall S. Hughes, Tao Wang, Yang Xie, David E. Gerber
Publikováno v:
Frontiers in Immunology, Vol 15 (2024)
BackgroundA useful clinical biomarker requires not only association but also a consistent temporal relationship. For instance, chemotherapy-induced neutropenia and epidermal growth-factor inhibitor-related acneiform rash both occur within weeks of tr
Externí odkaz:
https://doaj.org/article/e1b2ad32701a42d2b479f1f97e15f912
Autor:
Murtaza Ahmed Siddiqi, Wooguil Pak
Publikováno v:
IEEE Access, Vol 10, Pp 108530-108544 (2022)
The innovation and evolution of hacking methodologies have led to a sharp rise in cyber attacks, highlighting the need for enhanced network security approaches. Network intrusion detection systems based on machine learning are playing a significant r
Externí odkaz:
https://doaj.org/article/41a4edcedfdc42099d090b7c11aec1aa
Publikováno v:
Mathematical Biosciences and Engineering, Vol 19, Iss 3, Pp 2641-2670 (2022)
Over time, the use of UAVs (unmanned aerial vehicles)/drones has increased across several civil and military application domains. Such domains include real-time monitoring, remote sensing, wireless coverage in disaster areas, search and rescue, produ
Externí odkaz:
https://doaj.org/article/843669ea11ca4a14920343880d37a97a
Autor:
Murtaza Ahmed Siddiqi, Wooguil Pak
Publikováno v:
IEEE Access, Vol 9, Pp 137494-137513 (2021)
Detecting intrusion in network traffic has remained a problematic task for years. Progress in the field of machine learning is paving the way for enhancing intrusion detection systems. Due to this progress intrusion detection has become an integral p
Externí odkaz:
https://doaj.org/article/01e1d9397cb64a5c8e936981b039b245
Autor:
Xiaosong Meng, Murtaza Ahmed, Kevin D. Courtney, Waddah Arafat, Ibrahim Ibrahim, Vitaly Margulis, Craig Nichols, Aditya Bagrodia
Publikováno v:
Frontiers in Oncology, Vol 11 (2021)
IntroductionPatients with advanced germ cell tumors (GCT) receiving cisplatin-based chemotherapy have high rates of thromboembolic events (TEE) which can negatively affect their overall survival. While primary TEE prophylaxis during chemotherapy may
Externí odkaz:
https://doaj.org/article/fdc22da99b7049d1b76096addad2f610
Autor:
Yang Xie, Vinita Popat, Shaheen Khan, Saad A Khan, Edward K Wakeland, Quan-Zhen Li, Murtaza Ahmed, Mitchell S von Itzstein, Thomas Sheffield, Farjana Fattah, Jason Y Park, Jessica M Saltarski, Yvonne Gloria-McCutchen, David Hsiehchen, Jared Ostmeyer, Nazima Sultana
Publikováno v:
Journal for ImmunoTherapy of Cancer, Vol 9, Iss 6 (2021)
Background Increased body mass index (BMI) has been associated with improved response to immune checkpoint inhibitors (ICIs) in multiple cancer types. We evaluated associations between BMI, ICI dosing strategy, and clinical outcomes.Methods We abstra
Externí odkaz:
https://doaj.org/article/621df1a1a67640a2af6757144a9d4c70
Publikováno v:
Applied Sciences, Vol 12, Iss 12, p 6042 (2022)
As cybersecurity strategies become more robust and challenging, cybercriminals are mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social engineering by criminals to exploit the human factor in an organization’s
Externí odkaz:
https://doaj.org/article/82ff57fccdc149ca92f01fd8b3d483d5
Publikováno v:
JISR on Computing, Vol 18, Iss 1 (2020)
Wi-Fi based indoor positioning with the help of access points and smart devices have become an integral part in finding a device or a person’s location. Wi-Fi based indoor localization technology has been among the most attractive field for researc
Externí odkaz:
https://doaj.org/article/84248c5e0f15435d9111c79453bf0768
Publikováno v:
Sukkur IBA Journal of Computing and Mathematical Sciences, Vol 2, Iss 1 (2018)
Security has always been a major area of concern for WSN. Due to limited resources and size constrain of a node, WSN still lacks a comprehensive security mechanism for its operations. In this paper, some of the purposed security methods for WSN are b
Externí odkaz:
https://doaj.org/article/61606db2ba7e4d5a80862905c15b5f96
Autor:
Murtaza Ahmed, M.N.A. Khan
Publikováno v:
JISR on Computing, Vol 15, Iss 1 (2017)
Mobile forensics analysis is the sub-domain of digital forensics, which addresses solving the minor technology misuse cases to substantial international digital crime cases. Mobile forensic refers to the acquisition of data and analysis of the artifa
Externí odkaz:
https://doaj.org/article/72da4e04f6af4866b889e34dc9d069ed