Maqsood Mahmud, PhD.
Maqsood Mahmud, PhD.
Assistant Professor, Imam Abdulrahman Bin Faisal, University, Dammam, Saudi Arabia
Verified email at - Homepage
Cited by
Cited by
Stock market forecasting by using a hybrid model of exponential fuzzy time series
FM Talarposhti, HJ Sadaei, R Enayatifar, FG Guimar„es, M Mahmud, ...
International Journal of Approximate Reasoning 70, 79-98, 2016
A hybrid model based on differential fuzzy logic relationships and imperialist competitive algorithm for stock market forecasting
HJ Sadaei, R Enayatifar, MH Lee, M Mahmud
Applied Soft Computing 40, 132-149, 2016
Evolutionary-based image encryption using RNA codons truth table
JYC MaqsoodMahmud, Atta-ur-Rahman, MalreyLee
Optics & Laser Technology 121, 2020
Combining ARFIMA models and fuzzy time series for the forecast of long memory time series
HJ Sadaei, R Enayatifar, FG Guimar„es, M Mahmud, ZA Alzamil
Neurocomputing 175, 782-796, 2016
Frequency based feature selection method using whale algorithm
EA Hossein Nematzadeh, Rasul Enayatifar, Maqsood Mahmud
Genomics, 2019
Reversible and fragile watermarking for medical images
K Sultan, N Aldhafferi, A Alqahtani, M Mahmud
Computational and mathematical methods in medicine 2018, 2018
Robust and Fragile Medical Image Watermarking: A Joint Venture of Coding and Chaos Theories
MM Atta Ur Rahman, Kiran Sultan, Dhiaa Musleh,Nahier Aldhafferi, Abdullah ...
Journal of Healthcare Engineering 2018, 11, 2018
Bio-chaotic stream cipher-based iris image encryption
AS Alghamdi, H Ullah, M Mahmud, MK Khan
2009 International Conference on Computational Science and Engineering 2†…, 2009
Security analysis of firewall rule sets in computer networks
B Khan, MK Khan, M Mahmud, KS Alghathbar
2010 Fourth International Conference on Emerging Security Information†…, 2010
MR imaging enhancement and segmentation of tumor using fuzzy curvelet
MA Jaffar, AA Mirza, M Mahmud
International Journal of the Physical Sciences 6 (31), 7242-7246, 2011
Intrinsic authentication of multimedia objects using biometric data manipulation.
M Mahmud, MK Khan, K Alghathbar, AH Abdullah, MYB Idris
Int. Arab J. Inf. Technol. 9 (4), 336-342, 2012
Network Anomaly Detection in 5G Networks
DA Atta-ur Rahman, Maqsood Mahmud, Tahir Iqbal, Linah Saraireh, Hisham ...
Mathematical Modelling of Engineering Problems 9 (2), 397-404, 2022
Impact of social networking sites (SNSs) on youth
Z Akram, M Mahmud, A Mahmood
Applied Science Reports 11 (1), 6-10, 2015
Head based tracking
M Ullah, M Mahmud, H Ullah, K Ahmad, AS Imran, FA Cheikh
Electronic Imaging 2020 (6), 74-1-74-6, 2020
A novel cybersecurity framework for countermeasure of sme's in saudi arabia
L Ajmi, N Alqahtani, AU Rahman, M Mahmud
2019 2nd International Conference on Computer Applications & Information†…, 2019
Synchronization of virtual databases: a case of smartphone contacts
FA Alhaidari, D Musleh, M Mahmud, MA Khan
Journal of Computational and Theoretical Nanoscience 16 (5-6), 1740-1757, 2019
A Lightweight Secure Data Aggregation Technique for Wireless Sensor Network
MA Hossain, M Mahmud, MI Chaudry, A Almogren, M Alnuem, A Alamri
IEEE International Symposium on Multimedia (ISM), 2014, 387 - 392, 2014
Biometric-gaussian-stream (BGS) cipher with new aspect of image encryption (data hiding)
M Mahmud, MK Khan, K Alghathbar
Bio-Science and Bio-Technology: International Conference, BSBT 2009 Held as†…, 2009
Information security in business: a bibliometric analysis of the 100 top cited articles
M Mahmud, IU Haq
Library Philosophy and Practice, 1-49, 2021
Medical Image Watermarking for Fragility and Robustness: A Chaos, Error Correcting Codes and Redundant Residue Number System Based Approach
M Mahmud, K Sultan, N Aldhafferi, A Alqahtani, D Musleh
Journal of Medical Imaging and Health Informatics 8 (6), 1192-1200, 2018
The system can't perform the operation now. Try again later.
Articles 1–20