Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Sana Qaiyum"'
Publikováno v:
Mathematics, Vol 11, Iss 18, p 3894 (2023)
The Intrusion Detection System (IDS) is the most widely used network security mechanism for distinguishing between normal and malicious traffic network activities. It aids network security in that it may identify unforeseen hazards in network traffic
Externí odkaz:
https://doaj.org/article/cbf5bff238e648c4905f6d6b2a81b910
Publikováno v:
Sensors, Vol 20, Iss 11, p 3210 (2020)
Data Streams create new challenges for fuzzy clustering algorithms, specifically Interval Type-2 Fuzzy C-Means (IT2FCM). One problem associated with IT2FCM is that it tends to be sensitive to initialization conditions and therefore, fails to return g
Externí odkaz:
https://doaj.org/article/a9dcb178e279403799927b1dec6b5c04
Autor:
Narendar Singh D, Murugamani C, Pravin R. Kshirsagar, Vineet Tirth, Saiful Islam, Sana Qaiyum, Suneela B, Mesfer Al Duhayyim, Yosef Asrat Waji
Publikováno v:
Scientific Programming. 2022:1-11
Wastewater is created by pharma firms and has become a huge worry for the ecosystem. There is a significant amount of toxins that are being dropped continuously from numerous pharmaceutical companies that causes serious damages to the environment and
Autor:
Abdulmohsen Almalawi, Asif Irshad Khan, Fahad Alqurashi, Yoosef B. Abushark, Md Mottahir Alam, Sana Qaiyum
Publikováno v:
Chemosphere. 303(Pt 2)
Environmental distresses linked to heavy metal (HM) impurity in the water received significant attention among research communities. Recently, advancements in industrial sectors like paper industries, mining, non-ferrous metallurgy, electroplating, m
Autor:
Sulaima Lebbe Abdul Haleem, vani A, Hemalatha S, Vasantha Gowri N, Sana Qaiyum, vijayakumar P
Distributed Denial of Service (DDoS) attacks represent an important challenge for public cloud as they invade the offender and completely delete Cloud service in order to serve the correct user and at the same time against the targets that cause syst
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::060afbf3a0b696572e6538cca6cf174c
https://doi.org/10.21203/rs.3.rs-349667/v1
https://doi.org/10.21203/rs.3.rs-349667/v1
Publikováno v:
International Journal of Advanced Computer Science and Applications. 10
Fuzzy C-Means (FCM) is widely accepted as a clustering technique. However, it cannot often manage different uncertainties associated with data. Interval Type-2 Fuzzy C-Means (IT2FCM) is an improvement over FCM since it can model and minimize the effe
Autor:
Zahir Tari, Sheikh Tahir Bakhsh, Madini O. Alassafi, Abdulrahman A. Alshdadi, Abdulmohsen Almalawi, Adil Fahad, Asif Irshad Khan, Sana Qaiyum, Nouf Alzahrani
Publikováno v:
Electronics
Volume 9
Issue 6
Electronics, Vol 9, Iss 1017, p 1017 (2020)
Volume 9
Issue 6
Electronics, Vol 9, Iss 1017, p 1017 (2020)
Supervisory control and data acquisition (SCADA) systems monitor and supervise our daily infrastructure systems and industrial processes. Hence, the security of the information systems of critical infrastructures cannot be overstated. The effectivene
Publikováno v:
Sensors
Volume 20
Issue 11
Sensors, Vol 20, Iss 3210, p 3210 (2020)
Sensors (Basel, Switzerland)
Volume 20
Issue 11
Sensors, Vol 20, Iss 3210, p 3210 (2020)
Sensors (Basel, Switzerland)
Data Streams create new challenges for fuzzy clustering algorithms, specifically Interval Type-2 Fuzzy C-Means (IT2FCM). One problem associated with IT2FCM is that it tends to be sensitive to initialization conditions and therefore, fails to return g
Publikováno v:
ICERI Proceedings.
Autor:
Nur Faiza Ali, Jafreezal Jaafar, Izzatdin Abdul Aziz, Sana Qaiyum, Eliya Fariha Rusli, Nazleeni Samiha Haron
Publikováno v:
2017 IEEE Conference on Wireless Sensors (ICWiSe).
This study examined the issues of pipeline leakage of non-revenue water which is caused by pipe burst, pipe leakage and meter inaccuracy. In England and Wales, 3, 108, 000 liters of water from treatment plant are wasted daily through the pipeline lea