Usama Ahmed

Orcid: 0000-0001-8433-7185

According to our database1, Usama Ahmed authored at least 13 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Fuzzy Inference-Based Decision Support System for Disease Diagnosis.
Comput. J., September, 2023

2022
Aggregated Capability Assessment (AgCA) For CAIQ Enabled Cross-cloud Federation.
IEEE Trans. Serv. Comput., 2022

QoS-aware trust establishment for cloud federation.
Concurr. Comput. Pract. Exp., 2022

Prediction of Diabetes Empowered With Fused Machine Learning.
IEEE Access, 2022

2020
Federating Cloud Systems for Collaborative Construction and Engineering.
IEEE Access, 2020

2019
Trust Evaluation in Cross-Cloud Federation: Survey and Requirement Analysis.
ACM Comput. Surv., 2019

Fabrication of Microfluidic Impedance Cytometer for Leukocytes Analysis.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

2018
Risk-Based Service Selection in Federated Clouds.
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018

2017
Multi-mode operation of principal component analysis with k-nearest neighbor algorithm to monitor compressors for liquefied natural gas mixed refrigerant processes.
Comput. Chem. Eng., 2017

2015
Modelling cyber security for software-defined networks those grow strong when exposed to threats - Analysis and propositions.
J. Reliab. Intell. Environ., 2015

2011
Energy efficient routing protocol for zone based mobile sensor networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Quantifying the role of access control in end-to-end network security.
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011

2009
Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks.
Proceedings of the Advances in Information Security and Assurance, 2009


  Loading...