Your selections:
A novel approach to data extraction on hyperlinked webpages
- Shaukat, Kamran, Masood, Nayyer, Khushi, Matloob
A bibliometric analysis of Corona pandemic in social sciences: a review of influential aspects and conceptual structure
- Nasir, Adeel, Shaukat, Kamran, Hameed, Ibraham A., Luo, Suhuai, Alam, Talha Mahboob, Iqbal, Farhat
A comprehensive dataset for bibliometric analysis of SARS and coronavirus impact on social sciences
- Shaukat, Kamran, Alam, Talha Mahboob, Hameed, Ibrahim A., Luo, Suhuai, Li, Jiaming, Aujla, Gagandeep Kaur, Iqbal, Farhat
A model to enhance governance issues through opinion extraction
- Shaukat, Kamran, Alam, Talha Mahboob, Ahmed, Muhammad, Luo, Suhuai, Hameed, Ibrahim A., Iqbal, Muhammad Shahid, Li, Jiaming, Iqbal, Muhammad Atif
A survey on machine learning techniques for cyber security in the last decade
- Shaukat, Kamran, Luo, Suhuai, Varadharajan, Vijay, Hameed, Ibrahim A., Xu, Min
An investigation of credit card default prediction in the imbalanced datasets
- Alam, Talha Mahboob, Shaukat, Kamran, Hameed, Ibrahim A., Luo, Suhuai, Sarwar, Muhammad Umer, Shabbir, Shakir, Li, Jiaming, Khushi, Matloob
Corporate Bankruptcy Prediction: An Approach Towards Better Corporate World
- Alam, Talha Mahboob, Shaukat, Kamran, Mushtaq, Mubbashar, Ali, Yasir, Khushi, Matloob, Luo, Suhuai, Wahab, Abdul
Cyber Threat Detection Using Machine Learning Techniques: A Performance Evaluation Perspective
- Shaukat, Kamran, Luo, Suhuai, Chen, Shan, Liu, Dongxi
Domain specific lexicon generation through sentiment analysis
- Shaukat, Kamran, Hameed, Ibrahim A., Luo, Suhuai, Javed, Imran, Iqbal, Farhat, Faisal, Amber, Masood, Rabia, Usman, Ayesha, Shaukat, Usman, Hassan, Rosheen, Younas, Aliya, Ali, Shamsair, Adeem, Ghazif
MAC protocols 802.11: a comparative study of throughput analysis and improved LEACH
- Shaukat, Kamran, Iqbal, Farhat, Hameed, Ibrahim A., Umair Hassan, Muhammad, Luo, Suhuai, Hassan, Rosheen, Younas, Aliya, Ali, Shamshair, Adeem, Ghazif, Rubab, Afifah, Iqbal, Rimsha, Shehzadi, Irum
Performance comparison and current challenges of using machine learning techniques in cybersecurity
- Shaukat, Kamran, Luo, Suhuai, Varadharajan, Vijay, Hameed, Ibrahim A., Chen, Shan, Liu, Dongxi, Li, Jiaming
Risk factors identification of malignant mesothelioma: a data mining based approach
- Latif, Muhammad Zohaib, Shaukat, Kamran, Luo, Suhuai, Hameed, Ibrahim A., Iqbal, Farhat, Alam, Talha Mahboob
A comparative analysis of active learning for biomedical text mining
- Naseem, Usman, Khushi, Matloob, Khan, Shah Khalid, Shaukat, Kamran, Moni, Mohammad Ali
A comparative performance analysis of data resampling methods on imbalance medical data
- Khushi, Matloob, Shaukat, Kamran, Alam, Talha Mahboob, Hameed, Ibrahim A., Uddin, Shahadat, Luo, Suhuai, Yang, Xiaoyan, Reyes, Maranatha Consuelo
- Alam, Talha Mahboob, Shaukat, Kamran, Hameed, Ibrahim A., Khan, Wasim Ahmad, Sarwar, Muhammad Umer, Iqbal, Farhat, Luo, Suhuai
A novel method for performance measurement of public educational institutions using machine learning models
- Alam, Tahla Mahboob, Mushtaq, Mubbashar, Shaukat, Kamran, Hameed, Ibrahim A., Sarwar, Muhammad Umer, Luo, Suhuai
A review of content-based and context-based recommendation systems
- Javed, Umair, Shaukat, Kamran, Hameed, Ibrahim A., Iqbal, Farhat, Alam, Talha Mahboob, Luo, Suhuai
A review of time-series anomaly detection techniques: a step to future perspectives
- Shaukat, Kamran, Alam, Talha Mahboob, Luo, Suhuai, Shabbir, Shakir, Hameed, Ibrahim A., Li, Jiaming, Abbas, Syed Konain, Javed, Umair
A review on security challenges in internet of things (IoT)
- Shaukat, Kamran, Alam, Tahla Mahboob, Hameed, Ibrahim A., Khan, Wasim Ahmed, Abbas, Nadir, Luo, Suhuai
An analysis of Blessed Friday sale at a retail store using classification models
- Shaukat, Kamran, Luo, Suhuai, Abbas, Nadir, Mahboob Alam, Talha, Ehtesham Tahir, Muhammad, Hameed, Ibrahim A.
Are you sure you would like to clear your session, including search history and login status?