UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 200
11.
  • Pre-trained Model-based NFR... Pre-trained Model-based NFR Classification: Overcoming Limited Data Challenges
    Rahman, Kiramat; Ghani, Anwar; Alzahrani, Abdulrahman ... IEEE access, 01/2023, Volume: 11
    Journal Article
    Peer reviewed
    Open access

    Machine learning techniques have shown promising results in classifying NFR. However, the lack of annotated training data in the domain of requirement engineering poses challenges to the accuracy, ...
Full text
12.
  • Light-Weight Secure Aggrega... Light-Weight Secure Aggregated Data Sharing in IoT-Enabled Wireless Sensor Networks
    Said, Ghawar; Ghani, Anwar; Ullah, Ata ... IEEE access, 2022, Volume: 10
    Journal Article
    Peer reviewed
    Open access

    Internet of Things (IoT) is a network of physical objects or things that can communicate and share information. In IoT-enabled Wireless Medical Sensor Network (WMSN), the smart sensing devices share ...
Full text
13.
  • Bandwidth and power efficie... Bandwidth and power efficient lightweight authentication scheme for healthcare system
    Jan, Saeed Ullah; Ghani, Anwar; Alzahrani, Abdulrahman ... Journal of King Saud University. Computer and information sciences, July 2023, 2023-07-00, 2023-07-01, Volume: 35, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    This article works on profit maximization, in which customer satisfaction and efficient scheduling are considered to optimize the underlying resource utilization. The performance of services is one ...
Full text
14.
  • Spread Spectrum Based Energ... Spread Spectrum Based Energy Efficient Collaborative Communication in Wireless Sensor Networks
    Ghani, Anwar; Naqvi, Husnain; Sher, Muhammad ... PloS one, 07/2016, Volume: 11, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    Wireless sensor networks consist of resource limited devices. Most crucial of these resources is battery life, as in most applications like battle field or volcanic area monitoring, it is often ...
Full text

PDF
15.
  • Authentication and Secure K... Authentication and Secure Key Management in E-Health Services: A Robust and Efficient Protocol Using Biometrics
    Mehmood, Zahid; Ghani, Anwar; Chen, Gongliang ... IEEE access, 2019, Volume: 7
    Journal Article
    Peer reviewed
    Open access

    The use of modern technology for the Goodwell of human beings especially in medical science is a hot research area. Telecare Medicine Information System (TMIS) is very popular in health care services ...
Full text

PDF
16.
  • Reputation-Based Approach T... Reputation-Based Approach Toward Web Content Credibility Analysis
    Mahmood, Saba; Ghani, Anwar; Daud, Ali ... IEEE access, 2019, Volume: 7
    Journal Article
    Peer reviewed
    Open access

    Web content credibility implies finding credible and correct information on the web. Recent studies have shown there is an increasing trend of users turning towards the web for searching information ...
Full text

PDF
17.
  • Secure Medical Data Against... Secure Medical Data Against Unauthorized Access using Decoy Technology in Distributed Edge Computing Networks
    Khan, Imran; Ghani, Anwar; Saqlain, Syed Muhammad ... IEEE access, 01/2023, Volume: 11
    Journal Article
    Peer reviewed
    Open access

    The recent advancements in cyber technology have facilitated the global electronic sharing of healthcare data among various healthcare professionals, including clinicians, researchers, business ...
Full text
18.
  • Investigation on machining ... Investigation on machining performance of TiB2 and TiN coatings with modified cutting insert in AISI 1017 turning
    Zainal, Amirul; Hafizu Zakaria, Mohd; Anwar Che Ghani, Saiful IOP conference series. Materials Science and Engineering, 04/2020, Volume: 788, Issue: 1
    Journal Article, Conference Proceeding
    Peer reviewed
    Open access

    In the last decades machining methods have witnessed an advancement in both cutting tools' geometry and hard coatings, sometimes in combination with Ti-based coating. In the present study, the ...
Full text

PDF
19.
  • An efficient cryptographic ... An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks
    Ali, Shahwar; Humaria, A; Ramzan, M Sher ... International journal of distributed sensor networks, 06/2020, Volume: 16, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    In wireless sensor networks, the sensors transfer data through radio signals to a remote base station. Sensor nodes are used to sense environmental conditions such as temperature, strain, humidity, ...
Full text

PDF
20.
  • A lightweight and secure tw... A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks
    Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar ... PloS one, 04/2018, Volume: 13, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in ...
Full text

PDF
1 2 3 4 5
hits: 200

Load filters