Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Syed Zeeshan Hussain Shah"'
Autor:
Alishba Ahsan, Junaid Nasir, Syed Zeeshan Hussain Shah, Asma Irshad, Wajid Rafique, Sarousha Nasir, Sameer Malik, Nadeem Sarwar
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811552311
Classification is one of the most used machine learning technique especially in the prediction of daily life things. Its first step is grouping, dividing, categorizing, and separation of datasets based on future vectors. Classification procedure has
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dc1b830207246b5aa0a53d0c1de75ad0
https://doi.org/10.1007/978-981-15-5232-8_37
https://doi.org/10.1007/978-981-15-5232-8_37
Autor:
Sarousha Nasir, Alishba Ahsan, Asma Irshad, Sameer Malik, Syed Zeeshan Hussain Shah, Nadeem Sarwar, M. Zafar Iqbal, Junaid Nasir
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811552311
Climate is the absolute most occasions that influence the human life in each measurement, running from nourishment to fly while then again it is the most tragic wonders. In this manner, expectation of climate wonders is of significant enthusiasm for
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::866c9a47772ce598df09dd1c0fd79bc8
https://doi.org/10.1007/978-981-15-5232-8_16
https://doi.org/10.1007/978-981-15-5232-8_16
Autor:
Anees Baqir, Shahid Saleem, Sehrish Munawar Cheema, Syed Zeeshan Hussain Shah, Rukhsar Shafiq
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811552311
This research proposes a hierarchal, multi-agent based framework that is mapped onto combinatorial real life problems like university course time table scheduling at University of Sialkot that take a lot of hours even days to create or maintain a tim
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5c9892109b02836592d25f27e2b166e0
https://doi.org/10.1007/978-981-15-5232-8_67
https://doi.org/10.1007/978-981-15-5232-8_67
Autor:
Anees Baqir, Usman Ahmad, Syed Zeeshan Hussain Shah, Sana Ahmad Sani, Sayyam Malik, Faizan ul Mustafa
Publikováno v:
2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST).
This paper includes different models used for the authentication of social media account. Importance of security in authentication is described in paper. Different security and privacy models and techniques for authentication are used over the social
Autor:
Shahid Saleem, Syed Zeeshan Hussain Shah, Syed Younas Ali, Sehrish Munawar Cheema, Rabia Zafar
Publikováno v:
2019 International Conference on Information Science and Communication Technology (ICISCT).
Requirement engineering is an essential ingredient of software production and first level of software development life cycle (SDLC). In product quality perspective, Requirement Elicitation is a difficult and critical task. Different requirement pract