Muhammad Azeem

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Efficient scheme to perform semantic segmentation on 3-D brain tumor using 3-D u-net architecture.
Multim. Tools Appl., March, 2024

2023
Fractional Order Operator for Symmetric Analysis of Cancer Model on Stem Cells with Chemotherapy.
Symmetry, February, 2023

Intuitionistic Hesitant Fuzzy Partitioned Maclaurin Symmetric Mean Aggregation Operators-Based Algorithm and Its Application in Decision Making.
IEEE Access, 2023

A Blockchain-Based Requirement Management Framework for Distributed Software Development Environment.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

2022
A Systematic Literature Review on Block-chain Attacks.
Proceedings of the International Conference on Frontiers of Information Technology, 2022

2021
Neural Networks for Infectious Diseases Detection: Prospects and Challenges.
CoRR, 2021

A Systematic Literature Review on Phishing and Anti-Phishing Techniques.
CoRR, 2021

2020
Robust extended dissipativity analysis for Markovian jump discrete-time delayed stochastic singular neural networks.
Neural Comput. Appl., 2020

2019
Data Sharing System Integrating Access Control Based on Smart Contracts for IoT.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2019

Energy Trading Between Prosumer and Consumer in P2P Network Using Blockchain.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2019

Blockchain Based Decentralized Authentication and Licensing Process of Medicine.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2019

2018
A fuzzy based churn prediction and retention model for prepaid customers in telecom industry.
Int. J. Comput. Intell. Syst., 2018

2017
A churn prediction model for prepaid customers in telecom using fuzzy classifiers.
Telecommun. Syst., 2017

2016
AZ Model for Software Development.
CoRR, 2016

2014
Cloud Computing Security: A Survey.
Comput., 2014

Consolidated Identity Management System for secure mobile cloud computing.
Comput. Networks, 2014

Intelligent data cube construction and exploration.
Proceedings of the Ninth International Conference on Digital Information Management, 2014


  Loading...