default search action
Noman Islam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Umema Hani, Osama Sohaib, Khalid Khan, Asma Aleidi, Noman Islam:
Psychological profiling of hackers via machine learning toward sustainable cybersecurity. Frontiers Comput. Sci. 6 (2024) - 2023
- [j11]Mana Saleh Al Reshan, Darakhshan Syed, Noman Islam, Asadullah Shaikh, Mohammed Hamdi, Mohamed A. Elmagzoub, Ghulam Muhammad, Kashif Hussain Talpur:
A Fast Converging and Globally Optimized Approach for Load Balancing in Cloud Computing. IEEE Access 11: 11390-11404 (2023) - [j10]Roohan Aziz, Asim Imdad Wagan, Noman Islam:
Block based learned image compression. Multim. Tools Appl. 82(17): 26495-26509 (2023) - 2022
- [j9]Umair Saeed, Kamlesh Kumar, Asif Ali Laghari, Mansoor Ahmed Khuhro, Noman Islam, Ghulam Muhammad Shaikh, Fahad Hussain, Aftab Ahmed Shaikh:
A comparative analysis of classification techniques for human activity recognition using wearable sensors and smart-phones. EAI Endorsed Trans. Pervasive Health Technol. 8(30): e1 (2022) - 2021
- [j8]Muhammad Asim Shahid, Noman Islam, Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Shahrulniza Musa:
Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment. Comput. Sci. Rev. 40: 100398 (2021) - [j7]Noman Islam, Ghazala Shafi Sheikh, Zubair Ahmed Shaikh:
Using association rules mining, multi-level data representation and cross-layer operations for data management in mobile ad hoc network. Int. J. Intell. Eng. Informatics 9(3): 229-259 (2021) - 2020
- [j6]Kamlesh Kumar, Umair Saeed, Athaul Rai, Noman Islam, Ghulam Muhammad Shaikh, Abdul Qayoom:
IDC Breast Cancer Detection Using Deep Learning Schemes. Adv. Data Sci. Adapt. Anal. 12(2): 2041002:1-2041002:19 (2020) - [j5]Muhammad Asim Shahid, Noman Islam, Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Shahrulniza Musa:
A Comprehensive Study of Load Balancing Approaches in the Cloud Computing Environment and a Novel Fault Tolerance Approach. IEEE Access 8: 130500-130526 (2020) - [j4]Muhammad Talha Qureshi, Athaul Rai, Noman Islam, Ghazala Shafi Sheikh:
A Four-Pronged Low Cost and Optimized Traffic Routing Solution. Int. J. Interact. Mob. Technol. 14(10): 46-60 (2020)
2010 – 2019
- 2019
- [j3]Fahad Hussain, Umair Saeed, Ghulam Muhammad, Noman Islam, Ghazala Shafi Sheikh:
Classifying Cancer Patients Based on DNA Sequences Using Machine Learning. J. Medical Imaging Health Informatics 9(3): 436-443 (2019) - [c3]Noman Islam:
A Secure Service Discovery Scheme for Mobile ad hoc Network using Artificial Deep Neural Network. FIT 2019: 133-138 - [c2]Syed Rizwan, Syed Hasan Adil, Noman Islam:
Detecting Duplicates in Real-Time Data Warehouse Using Bloom Filter-Based Approach. INTAP 2019: 762-771 - [c1]Muhammad Imran, Muhammad Faisal, Noman Islam:
Problems and Vulnerabilities of Ethical Hacking in Pakistan. INTELLECT 2019: 1-6 - 2018
- [i10]Noman Islam, Zeeshan Islam:
An economic perspective on major cloud computing providers. CoRR abs/1810.05088 (2018) - [i9]Noman Islam, Ghazala Shafi Sheikh, Zeeshan Islam:
A cognitive radio ad hoc networks based disaster management scheme with efficient spectrum management, collaboration and interoperability. CoRR abs/1810.05090 (2018) - 2017
- [i8]Noman Islam, Zubair Ahmed Shaikh, Aqeel-ur Rehman, Muhammad Shahab Siddiqui:
HANDY: A Hybrid Association Rules Mining Approach for Network Layer Discovery of Services for Mobile Ad hoc Network. CoRR abs/1710.02035 (2017) - [i7]Noman Islam, Ghazala Shafi Shaikh:
Towards a disaster response system based on cognitive radio ad hoc networks. CoRR abs/1710.02404 (2017) - [i6]Noman Islam, Zeeshan Islam, Nazia Noor:
A Survey on Optical Character Recognition System. CoRR abs/1710.05703 (2017) - [i5]Noman Islam, Zubair Ahmed Shaikh:
A study of research trends and issues in wireless ad hoc networks. CoRR abs/1711.08405 (2017) - 2015
- [i4]Noman Islam, Zubair Ahmed Shaikh:
A novel approach to Service Discovery in Mobile Adhoc Network. CoRR abs/1506.02543 (2015) - [i3]Noman Islam, Zubair Ahmed Shaikh:
Exploiting Correlation among Data Items for Cache Replacement in Ad-hoc Networks. CoRR abs/1506.02553 (2015) - [i2]Noman Islam, Zubair Ahmed Shaikh:
Service Discovery in Mobile Ad hoc Networks Using Association Rules Mining. CoRR abs/1506.02556 (2015) - [i1]Noman Islam, Zubair Ahmed Shaikh, Shahnawaz Talpur:
Towards a Grid-based approach to Traffic Routing in VANET. CoRR abs/1506.02558 (2015) - 2014
- [j2]Aqeel-ur Rehman, Abu Zafar Abbasi, Noman Islam, Zubair Ahmed Shaikh:
A review of wireless sensors and networks' applications in agriculture. Comput. Stand. Interfaces 36(2): 263-270 (2014) - 2013
- [j1]Noman Islam, Zubair Ahmed Shaikh, Aqeel-ur Rehman, Muhammad Shahab Siddiqui:
HANDY: a hybrid association rules mining approach for network layer discovery of services for mobile ad hoc network. Wirel. Networks 19(8): 1961-1977 (2013) - [p1]Noman Islam, Zubair Ahmed Shaikh:
Security Issues in Mobile Ad Hoc Network. Wireless Networks and Security 2013: 49-80
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint