A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization D Ahamad, SA Hameed, M Akhtar Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022 | 63 | 2022 |
Strategy and implementation of web mining tools D Ahamad, D Mahmoud, MM Akhtar International Journal of Innovative Research in Advanced Engineering 4 (12), 1-7, 2017 | 17 | 2017 |
A novel hybrid meta‐heuristic concept for green communication in IoT networks: An intelligent clustering model MDM Akhtar, D Ahamad, AEM Abdalrahman, ASA Shatat, ASA Shatat International Journal of Communication Systems 35 (6), e5089, 2022 | 14 | 2022 |
A review and analysis of big data and mapreduce D Ahamad, M Akhtar, SA Hameed International Journal of Advanced Trends in Computer Science and Engineering …, 2019 | 11 | 2019 |
Big data classification in iot healthcare application using optimal deep learning MDM Akhtar, D Ahamad, ASA Shatat, ASA Shatat International Journal of Semantic Computing 17 (01), 33-58, 2023 | 8 | 2023 |
Alameen, Eltoum M. Abdalrahman.” Enhanced heuristic algorithm-based energy-aware resource optimization for cooperative IoT” MDM Akhtar, D Ahamad, ASA Shatat International Journal of Computers and Applications, Taylor & Francis 44 (10 …, 2022 | 7 | 2022 |
Optimisation algorithm-based recurrent neural network for big data classification MM Akhtar, D Ahamad, S AlamHameed International Journal of Intelligent Information and Database Systems 14 (2 …, 2021 | 7 | 2021 |
Development of Medidrone: a drone based emergency service system for Saudi Arabian Healthcare NA Khan, M Ahmad, S Alam, AMU Siddiqi, D Ahamad, MN Khalid 2021 International Conference on Computational Intelligence and Knowledge …, 2021 | 6 | 2021 |
Enhanced heuristic algorithm-based energy-aware resource optimization for cooperative IoT MDM Akhtar, D Ahamad, ASA Shatat, AEM Abdalrahman International Journal of Computers and Applications 44 (10), 959-970, 2022 | 5 | 2022 |
Provably secure authentication approach for data security in the cloud using hashing, encryption, and Chebyshev-based authentication D Ahamad, MM Akhtar, SA Hameed, MMMA Qerom International Journal of Electronic Security and Digital Forensics 13 (5 …, 2021 | 3 | 2021 |
Two level blockchain-based privacy preservation framework in IoT with heuristic fusion mechanism-aided deep learning architecture D Ahamad, SA Hameed Internet of Things 24, 100917, 2023 | 2 | 2023 |
Intrusion Management to avoid Web-Form Spamming in Cloud based architectures NA Khan, RF Mahafdah, MAM Nasimuddin, OM Alomari, AMU Siddiqi, ... 2019 International Conference on Computational Intelligence and Knowledge …, 2019 | 1 | 2019 |
SolarRadnet: A novel variant input scoring optimized recurrent neural network for solar irradiance prediction AEM Abdalrahman, D Ahamad, MA Md, K Gasmi Energy Sources, Part A: Recovery, Utilization, and Environmental Effects 44 …, 2022 | | 2022 |
Development of Mubadarah System-An Intelligent System for proposals at a University NA Khan, D Ahamad, S Alam, AMU Siddiqi, MN Khalid, MAM Nasimuddin 2021 International Conference on Computational Intelligence and Knowledge …, 2021 | | 2021 |
MATHEMATICAL STRUCTURE THEORY AS A SOURCE FOR BIG DATA SCIENCE MDM Akhtar, D Ahamad, AM Alotaibi | | |
Concealment Conserving the Data Mining of Groups & Individual AS Zamani, MM Akhtar, D Ahamad | | |