Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 39 matches
- 2024
- Ali Haider, Rafaqat Kazmi, Teg Alam, Rab Nawaz Bashir, Haitham Nobanee, Amjad Rehman Khan, Aqsa:
IoT- Enabled Firmness Grades of Tomato in Cold Supply Chain Using Fusion of Whale Optimization Algorithm and Extreme Learning Machine. IEEE Access 12: 52744-52758 (2024) - Pranav Shrivastava, Bashir Alam, Mansaf Alam:
Blockchain assisted blind signature algorithm with data integrity verification scheme. Concurr. Comput. Pract. Exp. 36(13) (2024) - Owais Bashir, Shabir Ahmad Bangroo, Shahid Shuja Shafai, Nicola Senesi, Shuraik Kader, Saud Alamri:
Geostatistical modeling approach for studying total soil nitrogen and phosphorus under various land uses of North-Western Himalayas. Ecol. Informatics 80: 102520 (2024) - Pranav Shrivastava, Bashir Alam, Mansaf Alam:
A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing. Multim. Tools Appl. 83(1): 2683-2702 (2024) - 2023
- Pranav Shrivastava, Bashir Alam, Mansaf Alam:
Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud. Clust. Comput. 26(6): 3673-3688 (2023) - Mohammad Basit, Bashir Alam, Zubaida Fatima, Salman Shaikh:
Natural Disaster Tweets Classification Using Multimodal Data. EMNLP 2023: 7584-7594 - Bashir Alam, Azmat Hussain, Muhammad Fayaz:
An Effective Approach for Air Quality Prediction in Bishkek Based on Machine Learning techniques. ICAAI 2023: 42-47 - 2022
- Kinza Rohail, Saba Bashir, Hazrat Ali, Tanvir Alam, Sheheryar Khan, Jia Wu, Pingjun Chen, Rizwan Qureshi:
Understanding Tumor Micro Environment Using Graph Theory. ACCV (Workshops) 2022: 90-101 - 2021
- Md Minhas Hossain Sakib, Aktiya Anjum Nishat, Mohammad Tarequl Islam, Mohammad Abu Raihan Uddin, Md Shahriar Iqbal, Farhan Fuad Bin Hossen, Mohammad Imran Ahmed, Md Samiul Bashir, Takbir Hossain, Umma Sumia Tohura, Saiful Islam Saif, Nabilah Rahman Jui, Mosharaf Alam, Md Aminul Islam, Md Mehadi Hasan, Md. Abu Sufian, Md. Ackas Ali, Rajib Islam, Mohammed Akhter Hossain, Mohammad A. Halim:
Computational screening of 645 antiviral peptides against the receptor-binding domain of the spike protein in SARS-CoV-2. Comput. Biol. Medicine 136: 104759 (2021) - Wakar Ahmad, Bashir Alam, Sanchit Ahuja, Sahil Malik:
A dynamic VM provisioning and de-provisioning based cost-efficient deadline-aware scheduling algorithm for Big Data workflow applications in a cloud environment. Clust. Comput. 24(1): 249-278 (2021) - Wakar Ahmad, Bashir Alam:
An efficient list scheduling algorithm with task duplication for scientific big data workflow in heterogeneous computing environments. Concurr. Comput. Pract. Exp. 33(5) (2021) - Om Pal, Bashir Alam, Vinay Thakur, Surendra Singh:
Key management for blockchain technology. ICT Express 7(1): 76-80 (2021) - Anshu Kumar Dwivedi, Pawan Singh Mehra, Om Pal, Mohammad Najmud Doja, Bashir Alam:
EETSP: Energy-efficient two-stage routing protocol for wireless sensor network-assisted Internet of Things. Int. J. Commun. Syst. 34(17) (2021) - Wakar Ahmad, Bashir Alam, Aman Atman:
An energy-efficient big data workflow scheduling algorithm under budget constraints for heterogeneous cloud environment. J. Supercomput. 77(10): 11946-11985 (2021) - 2020
- Yousaf Alamgir, Ismail Ben Mabrouk, Faisal Farooq, Muhammad Zada, Zubair Bashir, Adeel Akram, Mourad Nedil, Hyoungsuk Yoo:
Compacted Conformal Implantable Antenna With Multitasking Capabilities for Ingestible Capsule Endoscope. IEEE Access 8: 157617-157627 (2020) - Om Pal, Bashir Alam:
Efficient and Secure Key Management for Conditional Access Systems. IEEE Trans. Consumer Electron. 66(1): 1-10 (2020) - 2019
- Pawan Singh Mehra, Mohammad Najmud Doja, Bashir Alam:
Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN. Int. J. Commun. Syst. 32(3) (2019) - Om Pal, Bashir Alam:
Efficient and secure conditional access system for pay-TV systems. Multim. Tools Appl. 78(13): 18835-18853 (2019) - Pawan Singh Mehra, Mohammad Najmud Doja, Bashir Alam:
Enhanced Clustering Algorithm based on Fuzzy Logic (E-CAFL) for WSN E-CAFL for Homogeneous WSN. Scalable Comput. Pract. Exp. 20(1): 41-54 (2019) - Pawan Singh Mehra, Mohammad Najmud Doja, Bashir Alam:
Stability Enhancement in LEACH (SE-LEACH) for Homogeneous WSN. EAI Endorsed Trans. Scalable Inf. Syst. 6(20): e5 (2019) - 2018
- Usman Shafique, Abid Khan, Abdur Rehman, Faisal Bashir, Masoom Alam:
Detection of rank attack in routing protocol for Low Power and Lossy Networks. Ann. des Télécommunications 73(7-8): 429-438 (2018) - Md. Sakhawat Hossen, Md Yeakub Hassan, Faisal Hussain, Salimur Choudhury, Muhammad Mahbub Alam:
Relax online resource allocation algorithms for D2D communication. Int. J. Commun. Syst. 31(10) (2018) - Shweta Malhotra, Mohammad Najmud Doja, Bashir Alam, Mansaf Alam:
Skipnet-Octree Based Indexing Technique for Cloud Database Management System. Int. J. Inf. Technol. Web Eng. 13(3): 1-13 (2018) - Arvind Kumar, Bashir Alam:
Task Scheduling in Real Time Systems with Energy Harvesting and Energy Minimization. J. Comput. Sci. 14(8): 1126-1133 (2018) - 2017
- Md Yeakub Hassan, Faisal Hussain, Md. Sakhawat Hossen, Salimur Choudhury, Muhammad Mahbub Alam:
Interference Minimization in D2D Communication Underlaying Cellular Networks. IEEE Access 5: 22471-22484 (2017) - Shweta Malhotra, Mohammad Najmud Doja, Bashir Alam, Mansaf Alam:
E-GENMR: Enhanced Generalized Query Processing using Double Hashing Technique through MapReduce in Cloud Database Management System. J. Comput. Sci. 13(7): 234-246 (2017) - Vivek Sharma, Bashir Alam, Mohammad Najmud Doja:
ANFIS Aided AODV Routing Protocolfor Mobile Ad Hoc Networks. J. Comput. Sci. 13(10): 514-523 (2017) - Raja Sehrab Bashir, Sai Peck Lee, Chong Chun Yung, Khubaib Amjad Alam, Raja Wasim Ahmad:
A Methodology for Impact Evaluation of Refactoring on External Quality Attributes of a Software Design. FIT 2017: 183-188 - Md Yeakub Hassan, Faisal Hussain, Md. Sakhawat Hossen, Salimur Choudhury, Muhammad Mahbub Alam:
A near optimal interference minimization resource allocation algorithm for D2D communication. ICC 2017: 1-6 - Iram Naz, Raja Sehrab Bashir, Khubaib Amjad Alam:
Measuring the Impact of Changing Technology in Mobile Phones on User Device Interaction Based on a Qualitative Survey. ICEEG 2017: 9-14
skipping 9 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-28 11:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint