Khalil Ahmed Shaikh
179  results:
Search for persons X
?
1

Interoperability: Blockchain's Solution to SOA & Traditiona..:

, In: 2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC),
 
?
2

Performance analysis for SDN POX and open daylight controll..:

, In: Computational Intelligence in Software Modeling,
Ali, Sameer ; Reazul Haque, Muhammad ; Nisar, Kashif... - p. 177-198 , 2022
 
?
3

Linear Regression Based Crop Suggestive System for Local Pa..:

, In: 2023 Global Conference on Wireless and Optical Technologies (GCWOT),
 
?
4

Convolution Neural Network-Based CAPTCHA Recognition for In..:

, In: Advances in Intelligent Systems and Computing; Data Engineering and Intelligent Computing,
Sahil Ahmed, Shaikh ; Anand, Kumar M - p. 493-502 , 2021
 
?
5

Improving Intrusion Detection System Using Improved Variati..:

, In: 2023 8th International Conference on Intelligent Computing and Signal Processing (ICSP),
Ahmed, Kh Shaikh ; Yue, Li - p. 215-219 , 2023
 
?
6

Application of Artificial Intelligence for Temperature Prof..:

, In: 2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS),
 
?
7

A Hardware-based SoC Monitoring In-life Solution for Automo..:

, In: 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops),
 
?
8

Fully Automated Waste Management System Using Line Follower..:

, In: Emerging Research in Computing, Information, Communication and Applications; Lecture Notes in Electrical Engineering,
Geetha, V. ; Salvi, Sanket ; Ghosh, Sampat Kumar.. - p. 227-235 , 2021
 
?
9

Securing and Monitoring Applications Running on AKS:

, In: Azure Kubernetes Services with Microservices,
 
?
10

The Evolving Emphasis on Hard and Soft Skills in the IT Pro..:

, In: Proceedings of the 2018 ACM SIGMIS Conference on Computers and People Research,
 
?
11

Controlling the CNC machine using microcontroller to manufa..:

, In: 2016 Conference of Basic Sciences and Engineering Studies (SGCAC),
 
?
12

Credit to the Government: Central Bank Operation and its Re..:

, In: Africa and Asia in Comparative Economic Perspective,
Ahmed, Shaikh S. - p. 221-239 , 2001
 
?
13

Formal Analysis and Design of Authentication Protocols:

, In: Handbook of Research on Information Security and Assurance,
 
?
14

CTIoT: A Cyber Threat Intelligence Tool for IoT:

, In: 2024 International Wireless Communications and Mobile Computing (IWCMC),
El Jaouhari, Saad ; Ahmed, Shaikh - p. 1483-1489 , 2024
 
?
15

A Smart Electromagnetic Lens Antenna Design for Next-Genera..:

, In: Smart Technologies for a Sustainable Future; Lecture Notes in Networks and Systems,
 
1-15