default search action
Irfan Ali Kandhro
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Mir Sajjad Hussain Talpur, Abdul Ahad Abro, Mansoor Ebrahim, Irfan Ali Kandhro, Selvakumar Manickam, Sham-ul-Arfeen Laghari, Abdulhalim Dandoush, Mueen Uddin:
Illuminating Healthcare Management: A Comprehensive Review of IoT-Enabled Chronic Disease Monitoring. IEEE Access 12: 48189-48209 (2024) - [j11]Mudassir Iftikhar, Irfan Ali Kandhro, Neha Kausar, Asadullah Kehar, Mueen Uddin, Abdulhalim Dandoush:
Plant disease management: a fine-tuned enhanced CNN approach with mobile app integration for early detection and classification. Artif. Intell. Rev. 57(7): 167 (2024) - [j10]Raja Sohail Ahmed Larik, Yongli Wang, Irfan Ali Kandhro, Nabila Sehito, Ghulam Ali Mallah, Fayyaz Ali:
Trilinear pairing-based cryptosystem authentication: for electronic health record security in healthcare system. Int. J. Inf. Comput. Secur. 23(2): 139-162 (2024) - [j9]Irfan Ali Kandhro, Fayyaz Ali, Mueen Uddin, Asadullah Kehar, Selvakumar Manickam:
Exploring aspect-based sentiment analysis: an in-depth review of current methods and prospects for advancement. Knowl. Inf. Syst. 66(7): 3639-3669 (2024) - [j8]Muniba Humayun, Raheel Siddiqi, Mueen Uddin, Irfan Ali Kandhro, Maha S. Abdelhaq, Raed A. Alsaqour:
A novel methodology for offline English handwritten character recognition using ELBP-based sequential (CNN). Neural Comput. Appl. 36(30): 19139-19156 (2024) - 2023
- [j7]Irfan Ali Kandhro, Sultan Munadi Alanazi, Fayyaz Ali, Asadullah Kehar, Kanwal Fatima, Mueen Uddin, Shankar Karuppayah:
Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures. IEEE Access 11: 9136-9148 (2023) - [j6]Muhammad Ameen Chhajro, Kirshan Kumar Luhana, Asif Ali Wagan, Irfan Ali Kandhro:
Text sentiment analysis from students' comments using various machine learning and deep learning techniques: a comparative analysis. Int. J. Data Anal. Tech. Strateg. 15(4): 323-338 (2023) - [j5]Irfan Ali Kandhro, Umer Khan, Shahrukh Memon, Mohammad Yasir:
Discover and safe: an automated security management system for educational institutions. Int. J. Electron. Secur. Digit. Forensics 15(2): 158-176 (2023) - [j4]Irfan Ali Kandhro, Fayyaz Ali, Asif Ali Wagan, Iqra Tabassum M. Ali, Farhan Afzal:
Safe and secure: an automated library management system for monitoring book rotation using face recognition. Int. J. Electron. Secur. Digit. Forensics 15(3): 225-239 (2023) - [j3]Raheel Siddiqi, Syeda Nazia Ahraf, Irfan Ali Kandhro:
Susceptibility of paediatric pneumonia detection model under projected gradient descent adversarial attacks. Int. J. Electron. Secur. Digit. Forensics 15(3): 322-331 (2023) - [j2]Danella Patrick, Abdullah Ayub Khan, Fayyaz Ali, Irfan Ali Kandhro, Mahnoor Anwar, Asadullah Kehar, Anwar Ali Sanjrani:
A novel comparison of data analytics and business intelligence tools: an information preservation and ledger management solution. Int. J. Electron. Secur. Digit. Forensics 15(4): 387-412 (2023) - 2020
- [j1]Irfan Ali Kandhro, Sahar Zafar Jumani, Kamlash Kumar, Abdul Hafeez, Fayyaz Ali:
Roman Urdu Headline News Text Classification Using RNN, LSTM and CNN. Adv. Data Sci. Adapt. Anal. 12(2): 2050008:1-2050008:13 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint