CNN-based brain tumor detection model using local binary pattern and multilayered SVM classifier M Kolla, RK Mishra, SZ Ul Huq, Y Vijayalata, MV Gopalachari Computational intelligence and neuroscience 2022, 2022 | 21 | 2022 |
Security analysis of binding update protocols in route optimization of MIPv6 D Kavitha, KES Murthy, SZ ul Huq 2010 International Conference on Recent Trends in Information …, 2010 | 15 | 2010 |
Sandbox security model for Hadoop file system G Begum, SZU Huq, APS Kumar Journal of Big Data 7 (1), 82, 2020 | 6 | 2020 |
A secure route optimization protocol in mobile IPv6 D Kavitha, EK Murthy, SZ Hug International Journal of Computer and Network Security (IJCSNS) 9 (3), 27-34, 2009 | 6 | 2009 |
An efficient hierarchical certificate based binding update protocol for route optimization in mobile ipv6 D Kavitha, KES Murthy, B Sathyanarayana, VR Reddy, SZ Huq Global Journal of Computer Science and Technology 10 (2), 47-51, 2010 | 5 | 2010 |
EMMR: a multicast protocol for mobile ad hoc networks SU Huq, KS Murthy, D Kavitha, B Satyanaryana International Journal of Computer and Network Security 9 (4), 22-26, 2009 | 4 | 2009 |
Big data based analytic model to predict and classify breast cancer using improved fractional rough fuzzy K-means clustering and labeled ensemble classifier algorithm K Srikanth, SZ Ul Huq, AP Kumar Concurrency and Computation-Practice & Experience 34 (10), 2022 | 3 | 2022 |
Medical Data Classification Based on SMOTE and Recurrent Neural Network PP Prasad, FS Francis, S Zahoor-Ul-Huq International Journal of Engineering and Advanced Technology (IJEAT) 9 (3), 2020 | 3 | 2020 |
Study of detection of ip address conflicts in manets SZ ul Huq, KES Murthy, BS Narayana, D Kavitha Global J Comput Sci Tech 10 (1), 23-26, 2010 | 3 | 2010 |
Analysis of efficient address allocation schemes in mobile ad hoc networks SZU Huq, KES Murthy, B Satyanarayana, D Kavitha International Journal of Engineering Science and Technology 2 (3), 227-231, 2010 | 3 | 2010 |
Real time monitoring of integrated coalmine mashup middleware system using WSN DN Devi, S Zahoor-Ul-Huq, KI Ahamed Int. J. Recent Technol. Eng 7 (6), 276-278, 2019 | 2 | 2019 |
To Provide Security for Storage Services in Cloud Computing D Shravani, DSZU Huq IJCTT, vol4, 2013 | 2 | 2013 |
Dynamic IP Address Auto-configuration in MANETs SZ Ul Huq, D Kavitha, KE Sreenivas Murthy, B Satyanarayana Computer Networks and Information Technologies: Second International …, 2011 | 2 | 2011 |
Securing Binding Updates in Routing Optimizaton of Mobile IPv6 D Kavitha, KES Murthy, B Sathyanarayana, VR Reddy, SZ ul Huq The International Congress for global Science and Technology, 1, 2010 | 2 | 2010 |
Security Features in Hadoop—A Survey G Begum, SZU Huq, AP Siva Kumar Innovations in Computer Science and Engineering: Proceedings of 8th ICICSE …, 2021 | 1 | 2021 |
Analysis, implementation, and comparison of machine learning algorithms on breast Cancer dataset using WEKA tool K Srikanth, S Zahoor, U Huq, APS Kumar International Journal of Recent Technology and Engineering (IJRTE) 7, 2019 | 1 | 2019 |
Ensemble Approach for IP Autoconfiguration in Ad Hoc MANETs S Huq, S Begum, N Geethanjali, KES Murthy Mobile Communication and Power Engineering: Second international Joint …, 2013 | 1 | 2013 |
Results Analysis of IP Address Auto-Configuration in Wireless Manets SZU Huq, SS Begum, KS Murthy, B Satyanaryana International Journal of Engineering & Technology 3 (5), 0975-4024, 2011 | 1 | 2011 |
A Deep Learning Approach for Twitter Sentiment Analysis using ULM-SVM LS Rani, S Zahoor-Ul-Huq, CS Bindu 2024 11th International Conference on Computing for Sustainable Global …, 2024 | | 2024 |
Fuzzy K-Means with M-KMP: a security framework in pyspark environment for intrusion detection G Begum, SZ Ul Huq, APS Kumar Multimedia Tools and Applications, 1-23, 2024 | | 2024 |