Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Rabia Abid"'
Publikováno v:
South African Journal of Radiology, Vol 28, Iss 1, Pp e1-e4 (2024)
Heterotaxy syndrome, also known as situs ambiguous, is a spectrum of pathology due to loss of the normal right-to-left asymmetry of the thoraco-abdominal organs. This report describes the case of a 39-year-old female, previously well, who presented w
Externí odkaz:
https://doaj.org/article/c9247c54984241499028b6099b73e684
Autor:
Clive B. Beggs, Rabia Abid, Fariborz Motallebi, Abdus Samad, Nithya Venkatesan, Eldad J. Avital
Publikováno v:
Fluids, Vol 9, Iss 3, p 54 (2024)
COVID-19 is an airborne disease, with the vast majority of infections occurring indoors. In comparison, little transmission occurs outdoors. Here, we investigate the airborne transmission pathways that differentiate the indoors from outdoors and conc
Externí odkaz:
https://doaj.org/article/08d977ba2218404b95bbc22fd547ef3e
Publikováno v:
Mehran University Research Journal of Engineering and Technology, Vol 33, Iss 4, Pp 398-412 (2014)
This paper discusses a pre-feasibility study of 80MW onshore wind farm in the KPK (Khyber Pakhtunkhwa) province previously known as NWFP (North West Frontier) Province of Pakistan. The realistic data of wind speed is collected from Laboratory of Mete
Externí odkaz:
https://doaj.org/article/f0b3cc4aab71413c8badfa8c6e14f593
Autor:
Muhammad Rizwan, Rabia Abid, Mavra Mehmood, Jamel Nebhen, Talha Javed, Giridhar Reddy Bojja, Sidra Abbas
Publikováno v:
Computers, Materials & Continua. 70:91-107
Due to the widespread use of the internet and smart devices, various attacks like intrusion, zero-day, Malware, and security breaches are a constant threat to any organization’s network infrastructure. Thus, a Network Intrusion Detection System (NI
Autor:
Bakhtawar Aslam, Muhammad Rizwan, Abdul Rehman Javed, Mohammad Zubair Khan, Hafiza Ammara Khalid, Rabia Abid, Omar H. Alhazmi
Publikováno v:
Computers, Materials & Continua. 67:1933-1950
Autor:
Muhammad Rizwan, Rabia Abid, Jorge Crichigno, Abdul Rehman Javed, Gautam Srivastava, Arfa Arslaan Ikram
Publikováno v:
TSP
Mobile cloud computing provides on-demand resources. The architecture of mobile cloud computing is composed of a cluster of mobile devices. It is gaining popularity because of its cost-effectiveness and availability. There are numerous security issue
Publikováno v:
2019 International Conference on Innovative Computing (ICIC).
Aerospace Industry is making breakthrough development with Quantum System. Along with, security of the system is the most promising issue. Where Quantum Physics play a vital role in the security and challenges of Aircraft, a lot of cryptographic algo
Publikováno v:
2019 International Conference on Innovative Computing (ICIC).
Block-Chain security is the hot arising topic now-a-days. Block-Chain helps to get more secure, accurate and transparent data security in all sectors. In Health Sector, maintaining medical records is crucial, sharing medical records between record ro
Publikováno v:
2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE).
Mobile cloud computing MCC provide to a certain extent many settlement like battery timing, memory, consistency and scalability. Though, still there some sort essential elements, those should be discussed and make their implementation effective in MC
Autor:
Muhammad Rizwan, Rabia Abid, Hafiza Ammaraa Khalid, Nageen Saleem, Kashaf Junaid, Jaweria Manzoor, Fahad Ahmad
Publikováno v:
International Journal of Advanced Computer Science and Applications. 10
In the modern era where the use of computer systems in software houses is mandatory and in various organizations has increased, it has given rise to the level of stress of employees working for hours at the system as well. Employees working in softwa