A LANGUAGE INDEPENDENT APPROACH TO DEVELOP URDU STEMMER SK Sahid hussain, Faiyaz Ahmed Second International Conference on Advances in Computing and Information …, 2012 | 14* | 2012 |
Application of machine learning in forensic science M Haroon, MM Tripathi, F Ahmad Critical Concepts, Standards, and Techniques in Cyber Forensics, 228-239, 2020 | 9 | 2020 |
Different Approaches of Soft Computing Techniques (Inference System) which are used in Clinical Decision Support System for Risk based Prioritization DMDDRA Faiyaz Ahamad1* Asian Journal of Computer and Information Systems (ISSN: 2321 – 5658) 3 (01 …, 2015 | 6* | 2015 |
Secure key pre-distribution in wireless sensor networks using combinatorial design and traversal design based key distribution S Khalid, F Ahmad, MR Beg Journal of Computer and Communication Technology: Vol 5 (4), 5, 2014 | 5 | 2014 |
Scalable Design of Service Discovery Mechanism for Adhoc Network Using Wireless Mesh Network F Ahmad, S Khalid International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) ISSN No …, 2012 | 5 | 2012 |
A survey on multimedia technology and internet of things MM Tripathi, M Haroon, F Ahmad Multimedia Technologies in the Internet of Things Environment, Volume 2, 69-87, 2022 | 4 | 2022 |
A study of wsn and analysis of packet drop during transmission N Shakeel, M Haroon, F Ahmad International Journal of Innovative Research in Computer Science …, 2021 | 4 | 2021 |
Encrypting Data Using The Features of Memetic Algorithm and Cryptography F Ahmad, S Khalid, MS Hussain IJERA 2 (3), 3049-3051, 2012 | 4 | 2012 |
Integrative decision support model for smart agriculture based on internet of things and machine learning S Saqib Computer Science and Engineering Department, Integral University, 2021 | 2 | 2021 |
Cyber Forensic Lab Setup and Its Requirement MZ Khan, M Shoaib, F Ahmad Critical Concepts, Standards, and Techniques in Cyber Forensics, 103-115, 2020 | 2 | 2020 |
Literature review on software complexity, software usability and software deliverability M Khan, F Ahmad, MA Khanum International Journal of Advanced Research in Computer Science 9 (2), 438-441, 2018 | 2 | 2018 |
Automatic driving system by recognizing road signs using digital image processing RA Dasari California State University, Long Beach, 2016 | 2* | 2016 |
Protecting sensitive data in salesforce–A multi-layered security approach SJ Sadaf Jahan, F Ahmad, M Haroon International Journal of Engineering and Management Research 13, 2023 | 1 | 2023 |
Forensic Case Studies F Ahmad, MZ Khan Critical Concepts, Standards, and Techniques in Cyber Forensics, 248-264, 2020 | 1 | 2020 |
Derivatization of Keto Fatty Acids IV Reaction of Hydrazoic Acid on Long Chain Keto Acid Esters F Ahmad, SF Siddiqi, SM Osmart Fette, Seifen, Anstrichmittel 88 (2), 62-65, 1986 | 1 | 1986 |
A FUZZY BASED PROPOSED FORECAST MODEL FOR BRAIN DISEASE SH Abbas, A Alam, RK Pandey, R Ranjan, E Hussain, A Prasad, ... International Neurourology Journal 27 (4), 1343-1353, 2023 | | 2023 |
Opinion extraction from big social data using machine learning techniques: A survey D Kumar, F Ahamad AIP Conference Proceedings 2916 (1), 2023 | | 2023 |
Ensuring Data Security on Salesforce: A Comprehensive Review of Security Measures and Best Practices SJ Sadaf Jahan, F Ahmad International Journal of Engineering and Management Research 13, 2023 | | 2023 |
Current Technologies and Tools Aiding Industry 5.0 Development SH Abbas, F Ahamad Cambridge Scholars Publishing, London, UK, 2023 | | 2023 |
A COMPLETE INTRODUCTION OF BIG DATA ANALYTICE SH Abbas, F Ahamad Blue Hill Publication Pvt. Ltd., 2023 | | 2023 |