Suivre
Huda Fatima
Huda Fatima
Adresse e-mail validée de jazanu.edu.sa
Titre
Citée par
Citée par
Année
Applying data mining techniques in cyber crimes
MA Khan, SK Pradhan, H Fatima
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 213-216, 2017
282017
Dynamic web service composition with QoS clustering
AK Tripathy, MR Patra, MA Khan, H Fatima, P Swain
2014 IEEE International Conference on Web Services, 678-679, 2014
232014
Survey on reverse-engineering tools for android mobile devices
A Albakri, H Fatima, M Mohammed, A Ahmed, A Ali, A Ali, NM Elzein
Mathematical Problems in Engineering 2022, 1-7, 2022
162022
Potentialities and priorities for higher educational development in Saudi Arabia for the next decade: Critical reflections of the vision 2030 framework
K Mohiuddin, OA Nasr, MN Miladi, H Fatima, S Shahwar, QN Naveed
Heliyon 9 (5), 2023
102023
Enhanced algorithmic modelling and architecture in deep reinforcement learning based on wireless communication Fintech technology
K Upreti, MH Syed, MA Khan, H Fatima, MS Alam, AK Sharma
Optik 272, 170309, 2023
82023
Data fusion & visualization application for network forensic investigation-a case study
H Fatima, S Satpathy, S Mahapatra, GN Dash, SK Pradhan
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 252-256, 2017
82017
Mobile learning evolution and emerging computing paradigms: An edge-based cloud architecture for reduced latencies and quick response time
K Mohiuddin, H Fatima, MA Khan, MA Khaleel, OA Nasr, S Shahwar
Array 16, 100259, 2022
62022
An efficient technique for Apriori algorithm in medical data mining
MA Khan, SK Pradhan, H Fatima
Innovations in Computer Science and Engineering: Proceedings of the Fifth …, 2019
52019
Soft Computing applications in Cyber crimes
H Fatima, GN Dash, SK Pradhan
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 66-69, 2017
32017
Information security: Artificial immune detectors in neural networks
H Fatima, SM Al-Turki, SK Pradhan, GN Dash
2015 2nd World Symposium on Web Applications and Networking (WSWAN), 1-6, 2015
32015
Applying data mining techniques in business intelligence
MA Khan, SK Pradhan, H Fatima
International Journal of Computer Science and Information Security 14 (11), 699, 2016
12016
Deployment of Intelligent Agents in Cognitive Networks
H Fatima, S Pradhan, MA Khan, GN Dash
International Journal of Computer Science and Information Security 8 (6), 2010
12010
Machine Learning-Based Structure Prediction for QM9 Quantum Datasets
HF Nahla K, Maimoona Ansari, Salah Eldeen F. Hegazi, Anjali Appukuttan ...
SSRG International Journal of Electrical and Electronics Engineering 11 (4 …, 2024
2024
Design of a Novel Edge-Centric Cloud Architecture for m-Learning Performance Effectiveness by Leveraging Distributed Computing Paradigms’ Potentials
K Mohiuddin, H Fatima, MA Khan, MA Khaleel, Z Begum, SA Khan, ...
SAGE Open 13 (3), 21582440231190337, 2023
2023
Survey on Reverse-Engineering Tools for Android Mobile Devices
HF Ashwag Bakri
Hindawi, 2022
2022
Determining Mobile Learning Potentialities in Emerging Computing Paradigms: an Exploratory Approach for Performance Optimization
K Mohiuddin, MA Islam, MA Khaleel, MN Miladi, OA Nasr, SA Khan, ...
2021
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–16