|
|
|
Tahir Ahmad, Muhammad Shahzad Faisal, Atif Rizwan, Reem Alkanhel, Prince Waqas Khan and Ammar Muthanna
The spreading of accidental or malicious misinformation on social media, specifically in critical situations, such as real-world emergencies, can have negative consequences for society. This facilitates the spread of rumors on social media. On social med...
ver más
|
|
|
|
|
|
|
Atif Rizwan, Naeem Iqbal, Rashid Ahmad and Do-Hyeun Kim
The generalization error of conventional support vector machine (SVM) depends on the ratio of two factors; radius and margin. The traditional SVM aims to maximize margin but ignore minimization of radius, which decreases the overall performance of the SV...
ver más
|
|
|
|
|
|
|
Miraal Kamal, Manal Atif, Hafsa Mujahid, Tamer Shanableh, A. R. Al-Ali and Ahmad Al Nabulsi
The advent of smart sensors, single system-on-chip computing devices, Internet of Things (IoT), and cloud computing is facilitating the design and development of smart devices and services. These include smart meters, smart street lightings, smart gas st...
ver más
|
|
|
|
|
|
|
Mohammed Al-Hitmi, Salman Ahmad, Atif Iqbal, Sanjeevikumar Padmanaban and Imtiaz Ashraf
Considering the aim of having low switching losses, especially in medium-voltage and high-power converters, the pre-programmed pulse width modulation technique is very useful because the generated harmonic content can be known in advance and optimized. A...
ver más
|
|
|
|
|
|
|
Nasser Ahmad, Amith Khandakar, Amir El-Tayeb, Kamel Benhmed, Atif Iqbal and Farid Touati
|
|
|
|
|
|
|
Craig A. Horne,Sean B. Maynard,Atif Ahmad
Dependence on information, including for some of the world?s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences...
ver más
|
|
|
|
|
|
|
Jeb Webb,Sean Maynard,Atif Ahmad,Graeme Shanks
Three deficiencies exist in the organisational practice of information security risk management: risk assessments are commonly perfunctory, security risks are estimated without investigation; risk is assessed on an occasional (as opposed to continuous) b...
ver más
|
|
|
|