Items where Author is "Qureshi, M.A."

Group by: Item Type | No Grouping
Number of items: 15.

Rehman, A. and Hassan, M.F.B. and Hooi, Y.K. and Qureshi, M.A. and Shukla, S. and Susanto, E. and Rubab, S. and Abdel-Aty, A. (2022) CTMF: Context-Aware Trust Management Framework for Internet of Vehicles. IEEE Access. p. 1.

Qureshi, M.A. and Hassan, M.F. and Ehsan, M.K. and Khan, M.O. and Ali, M.Y. and Khan, S. (2022) A Robust Graph Theoretic Solution of Routing in Intelligent Networks. Wireless Communications and Mobile Computing, 2022.

Qureshi, M.A. and Asif, M. and Hassan, M.F. and Abid, A. and Kamal, A. and Safdar, S. and Akber, R. (2022) Sentiment Analysis of Reviews in Natural Language: Roman Urdu as a Case Study. IEEE Access.

Qureshi, M.A. and Asif, M. and Hassan, M.F. and Abid, A. and Kamal, A. and Safdar, S. and Akber, R. (2022) Sentiment Analysis of Reviews in Natural Language: Roman Urdu as a Case Study. IEEE Access, 10. pp. 24945-24954.

Qureshi, M.A. and Asif, M. and Hassan, M.F. and Mustafa, G. and Ehsan, M.K. and Ali, A. and Sajid, U. (2022) A novel auto-annotation technique for aspect level sentiment analysis. Computers, Materials and Continua, 70 (3). pp. 4987-5004.

Rehman, A. and Hassan, M.F. and Hooi, Y.K. and Qureshi, M.A. and Chung, T.D. and Akbar, R. and Safdar, S. (2021) Context and machine learning based trust management framework for internet of vehicles. Computers, Materials and Continua, 68 (3). pp. 4125-4142.

Safdar, S. and Akbar, R. and Hassan, M.F. and Sharef, B.T. and Hajjar, K. and Qureshi, M.A. (2017) Mechanism to continue system availability during cyber threat scenario. Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017.

Qureshi, M.A. and Hassan, M.F. and Sammi, R. (2014) Rationale of students' failure in comprehending theoretical computer science courses. In: UNSPECIFIED.

Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akhbar, R. (2011) Effective Methods for Secure Authentication in Vulnerable Workflows using nxn Passwords. [Citation Index Journal]

Akhbar, R. and Hassan, M.F. and Qureshi, M.A. and Safdar, S. (2011) Structured Role Based Interaction Model for Agile Based Outsourced IT Projects: Client's Composite Structure. [Citation Index Journal]

Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akhbar, R. and Aamir, R. (2010) Authentication Model Based on Reformation Mapping Method. In: International Conference on Information and Emerging Technologies (ICIET 2010), 14-16 June 2010 , Karachi, Pakistan.

Qureshi, M.A. and Hassan, M.F. (2010) Improvements Over Two Phase Shortest Path Algorithm. In: International Symposium on Information Technology 2010, ITSim, June 2010, Kuala Lumpur.

Akbar, R. and Hassan, M.F. and Safdar, S. and Qureshi, M.A. (2010) Client’s Perspective: Realization as a New Generation Process for Software Project Development and Management. In: IEEE International Conference of Communication Software and Networks (ICCSN 2010), 28-26 Feb. 2010, Singapore.

Qureshi, M.A. and Hassan, M.F. and Safdar, S. and Akbar, R. and Sammi, R. (2010) An Edge-Wise Linear Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs. In: International Conference on Frontiers of Information Technology, 16th – 18th December 2009, Abbottabad, Pakistan.

Qureshi, M.A. and Hassan, M.F. and Safdar, S. and Akhbar, R. (2010) A O(|E|) Time Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs. International Journal on Computer Science and Information Security (IJSIS), Volume 6 (No 1). pp. 40-46. ISSN 1947-5500

This list was generated on Sat Nov 23 03:08:02 2024 +08.