default search action
Tahir Ahmad
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Tahir Ahmad, Amy Van Looy, Aygun Shafagatova:
Business Process Performance. Bus. Inf. Syst. Eng. 66(1): 67-84 (2024) - [i2]Tahir Ahmad, Sudipan Saha:
Specialized Change Detection using Segment Anything. CoRR abs/2408.06644 (2024) - 2023
- [j23]Subhan Ullah, Zahid Mahmood, Nabeel Ali, Tahir Ahmad, Attaullah Buriro:
Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks. Comput. 12(6): 115 (2023) - [j22]Fatima Batool, Jihad Mohammad, Siti-Rahmah Awang, Tahir Ahmad:
The effect of knowledge sharing and systems thinking on organizational sustainability: the mediating role of creativity. J. Knowl. Manag. 27(5): 1251-1278 (2023) - [j21]Osama Khalid, Subhan Ullah, Tahir Ahmad, Saqib Saeed, Dina A. Alabbad, Mudassar Aslam, Attaullah Buriro, Rizwan Ahmad:
An Insight into the Machine-Learning-Based Fileless Malware Detection. Sensors 23(2): 612 (2023) - [j20]Muhammad Ayaz Khan, Subhan Ullah, Tahir Ahmad, Khwaja Jawad, Attaullah Buriro:
Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol. Sensors 23(12): 5518 (2023) - [j19]Iqra Asghar, Muhammad Ayaz Khan, Tahir Ahmad, Subhan Ullah, Khwaja Mansoor ul Hassan, Attaullah Buriro:
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks. Sensors 23(16): 7268 (2023) - 2022
- [j18]Tahir Ahmad, Sher Ali, Syed Bilal Hussian Shah, Inam Ullah Khan, Muhammad Abul Hassan, Syed Irfan Ullah:
Joint mode selection and user association in D2D enabled multitier C-RAN. Clust. Comput. 25(4): 2403-2415 (2022) - [j17]Tahir Ahmad, Umberto Morelli, Silvio Ranise, Nicola Zannone:
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system. Int. J. Inf. Sec. 21(2): 379-408 (2022) - [j16]Mudassar Aslam, Muhammad Abbas Khan Abbasi, Tauqeer Khalid, Rafi us Shan, Subhan Ullah, Tahir Ahmad, Saqib Saeed, Dina A. Alabbad, Rizwan Ahmad:
Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance. Sensors 22(23): 9338 (2022) - [j15]Noorsufia Abdul Shukor, Tahir Ahmad, Amidora Idris, Siti-Rahmah Awang, Muhammad Zillullah Mukaram, Norma Alias:
Extended Graph of Fuzzy Topographic Topological Mapping Model: G04(FTTMn4). Symmetry 14(12): 2645 (2022) - [c23]Tahir Ahmad, Umberto Morelli, Silvio Ranise:
Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness. ARES 2022: 86:1-86:10 - 2021
- [j14]Amirul Aizad Ahmad Fuad, Tahir Ahmad:
Decomposing the Krohn-Rhodes Form of Electroencephalography (EEG) Signals Using Jordan-Chevalley Decomposition Technique. Axioms 10(1): 10 (2021) - [j13]Sudipan Saha, Tahir Ahmad:
Federated transfer learning: Concept and applications. Intelligenza Artificiale 15(1): 35-44 (2021) - [j12]Muhammad Zillullah Mukaram, Tahir Ahmad, Norma Alias, Noorsufia Abdul Shukor, Faridah Mustapha:
Extended Graph of the Fuzzy Topographic Topological Mapping Model. Symmetry 13(11): 2203 (2021) - [c22]Tahir Ahmad, Amy Van Looy:
About a Process-Technology Fit for Process Improvements in an Ambidextrous Environment. Business Process Management Workshops 2021: 166-178 - 2020
- [b1]Tahir Ahmad:
Access Control for IoT: Problems and Solutions in the Smart Home. University of Genoa, Italy, 2020 - [j11]Siti Salwana Mamat, Siti-Rahmah Awang, Tahir Ahmad:
Preference Graph of Potential Method as a Fuzzy Graph. Adv. Fuzzy Syst. 2020: 8697890:1-8697890:14 (2020) - [j10]Mujahid Abdullahi, Tahir Ahmad, Vinod Ramachandran:
A Review on Some Arithmetic Concepts of Z-Number and Its Application to Real-World Problems. Int. J. Inf. Technol. Decis. Mak. 19(4): 1091-1122 (2020) - [c21]Tahir Ahmad, Umberto Morelli, Silvio Ranise:
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem. SACMAT 2020: 213-220 - [i1]Sudipan Saha, Tahir Ahmad:
Federated Transfer Learning: concept and applications. CoRR abs/2010.15561 (2020)
2010 – 2019
- 2019
- [j9]Sheema Khan, Kashif Ahmad, Tahir Ahmad, Nasir Ahmad:
Food items detection and recognition via multiple deep models. J. Electronic Imaging 28(1): 013020 (2019) - [j8]Izaz Ullah Khan, Tahir Ahmad, Normah Maan:
Revised convexity, normality and stability properties of the dynamical feedback fuzzy state space model (FFSSM) of insulin-glucose regulatory system in humans. Soft Comput. 23(21): 11247-11262 (2019) - [c20]Tahir Ahmad:
The Impact of New IT Adoption on Business Process Management. RCIS 2019: 1-5 - [c19]Tahir Ahmad, Amy Van Looy:
Reviewing the historical link between Business Process Management and IT: making the case towards digital innovation. RCIS 2019: 1-12 - [c18]Andrea Palmieri, Paolo Prem, Silvio Ranise, Umberto Morelli, Tahir Ahmad:
MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers. SERVICES 2019: 47-53 - 2018
- [j7]Wan Munirah Wan Mohammad, Tahir Ahmad, Niki Anis Ab Karim, Azmirul Ashaari:
Fuzzy Arithmetical Modeling of a Steam Turbine and a Boiler System. Math. Model. Anal. 23(1): 101-116 (2018) - [c17]Rizwan Hamid Randhawa, Rashid Mahmood, Tahir Ahmad:
AquaEye: A Low Cost Flood Early Warning System for Developing Countries. FIT 2018: 345-349 - [c16]Tahir Ahmad, Silvio Ranise:
Validating Requirements of Access Control for Cloud-Edge IoT Solutions (Short Paper). FPS 2018: 131-139 - [c15]Tahir Ahmad, Umberto Morelli, Silvio Ranise, Nicola Zannone:
A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An AWS Case Study. SACMAT 2018: 235-246 - [c14]Siti Salwana Mamat, Tahir Ahmad, Siti-Rahmah Awang, Muhammad Zillullah Mukaram:
Ranking by Fuzzy Weak Autocatalytic Set. SCDS 2018: 161-172 - 2017
- [j6]Izaz Ullah Khan, Tahir Ahmad, Normah Maan:
A Reply to a Note on the Paper "A Simplified Novel Technique for Solving Fully Fuzzy Linear Programming Problems". J. Optim. Theory Appl. 173(1): 353-356 (2017) - [c13]Wan Munirah Wan Mohammad, Tahir Ahmad, Niki Anis Ab Rahman, Azmirul Ashaari:
Fuzzy Arithmetical Modeling of Pressurizer in a Nuclear Power Plant. SCDS 2017: 221-229 - 2016
- [c12]Tayyab Arshad, Muhammad Faheem Awan, Tahir Ahmad, Saad B. Qaisar:
Performance Evaluation of Mobile Broadband Cellular Networks in Pakistan. LCN Workshops 2016: 104-111 - [c11]Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Muhammad Faheem Awan, Tahir Ahmad, Saad B. Qaisar:
Analyzing internet censorship in Pakistan. RTSI 2016: 1-6 - [c10]Azmirul Ashaari, Tahir Ahmad, Suzelawati Zenian, Noorsufia Abdul Shukor:
Selection Probe of EEG Using Dynamic Graph of Autocatalytic Set (ACS). SCDS 2016: 25-36 - [c9]Wan Munirah Wan Mohammad, Tahir Ahmad, Azmirul Ashaari:
Modeling Steam Generator System of Pressurized Water Reactor Using Fuzzy Arithmetic. SCDS 2016: 237-246 - [c8]Suzelawati Zenian, Tahir Ahmad, Amidora Idris:
Edge Detection of Flat Electroencephalography Image via Classical and Fuzzy Approach. SCDS 2016: 247-255 - 2015
- [j5]Tahir Ahmad, Mehwish Waheed:
Cloud Computing Adoption Issues and Applications in Developing Countries: A Qualitative Approach. Int. Arab. J. e Technol. 4(2): 84-93 (2015) - [c7]Muhammad Faheem Awan, Tahir Ahmad, Saad B. Qaisar, Nick Feamster, Srikanth Sundaresan:
Measuring broadband access network performance in Pakistan: A comparative study. LCN Workshops 2015: 595-602 - [c6]Suzelawati Zenian, Tahir Ahmad, Amidora Idris:
Contrast Comparison of Flat Electroencephalography Image: Classical, Fuzzy, and Intuitionistic Fuzzy Set. SCDS 2015: 97-105 - [c5]Azmirul Ashaari, Tahir Ahmad, Mustaffa Shamsuddin, Wan Munirah Wan Mohammad:
An Autocatalytic Model of a Pressurized Water Reactor in a Nuclear Power Generation. SCDS 2015: 106-115 - [c4]Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Nick Feamster, Muhammad Faheem Awan, Tahir Ahmad, Saad B. Qaisar:
Monitoring Internet Censorship with UBICA. TMA 2015: 143-157 - 2014
- [j4]Vahideh Rezaie, Tahir Ahmad, Siti-Rahmah Awang, Masumeh Khanmohammadi, Normah Maan:
Ranking DMUs by Calculating the Interval Efficiency with a Common Set of Weights in DEA. J. Appl. Math. 2014: 346763:1-346763:9 (2014) - [j3]Tahir Ahmad, Usman Younis:
Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs. J. Netw. Comput. Appl. 41: 197-205 (2014) - 2013
- [j2]Izaz Ullah Khan, Tahir Ahmad, Normah Maan:
A Simplified Novel Technique for Solving Fully Fuzzy Linear Programming Problems. J. Optim. Theory Appl. 159(2): 536-546 (2013) - 2012
- [j1]Tahir Ahmad, Vinod Ramachandran:
Hyperspherical Manifold for EEG Signals of Epileptic Seizures. J. Appl. Math. 2012: 926358:1-926358:22 (2012)
2000 – 2009
- 2008
- [c3]Normah Maan, Tahir Ahmad:
Fuzzy Number in Determining the Optimal Solution of Multiple Input Multiple Output (MIMO) System. CIMCA/IAWTIC/ISE 2008: 1182-1187 - 2002
- [c2]Razidah Ismail, Tahir Ahmad, Shamsuddin Ahmad, Rashdi Shah Ahmad:
Determination of Parameters for Multivariable Control Systems using Fuzzy Algorithmic Approach. FSKD 2002: 428-431
1990 – 1999
- 1994
- [c1]Arthur M. Keller, Tahir Ahmad, Mike Clary, Owen Densmore, Steve Gadol, Wei Huang, Behfar Razavi, Robert Pang:
The Diana Approach to Mobile Computing. Mobidata 1994: 651-679
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint