Follow
Maqsood Mahmud, PhD.
Maqsood Mahmud, PhD.
School of Computing, Ulster University, Belfast, NI, UK
Verified email at ulster.ac.uk - Homepage
Title
Cited by
Cited by
Year
Stock market forecasting by using a hybrid model of exponential fuzzy time series
FM Talarposhti, HJ Sadaei, R Enayatifar, FG Guimarães, M Mahmud, ...
International Journal of Approximate Reasoning 70, 79-98, 2016
932016
Evolutionary-based image encryption using RNA codons truth table
JYC MaqsoodMahmud, Atta-ur-Rahman, MalreyLee
Optics & Laser Technology 121, 2020
882020
A hybrid model based on differential fuzzy logic relationships and imperialist competitive algorithm for stock market forecasting
HJ Sadaei, R Enayatifar, MH Lee, M Mahmud
Applied Soft Computing 40, 132-149, 2016
782016
Combining ARFIMA models and fuzzy time series for the forecast of long memory time series
HJ Sadaei, R Enayatifar, FG Guimarães, M Mahmud, ZA Alzamil
Neurocomputing 175, 782-796, 2016
682016
Frequency based feature selection method using whale algorithm
EA Hossein Nematzadeh, Rasul Enayatifar, Maqsood Mahmud
Genomics, 2019
622019
Toward zero trust security in 5g open architecture network slices
HA Kholidy, A Karam, J Sidoran, MA Rahman, M Mahmoud, M Badr, ...
MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 577-582, 2022
382022
Reversible and fragile watermarking for medical images
K Sultan, N Aldhafferi, A Alqahtani, M Mahmud
Computational and mathematical methods in medicine 2018 (1), 3461382, 2018
372018
Network Anomaly Detection in 5G Networks
DA Atta-ur Rahman, Maqsood Mahmud, Tahir Iqbal, Linah Saraireh, Hisham ...
Mathematical Modelling of Engineering Problems 9 (2), 397-404, 2022
35*2022
Robust and Fragile Medical Image Watermarking: A Joint Venture of Coding and Chaos Theories
MM Atta Ur Rahman, Kiran Sultan, Dhiaa Musleh,Nahier Aldhafferi, Abdullah ...
Journal of Healthcare Engineering 2018, 11, 2018
35*2018
Bio-chaotic stream cipher-based iris image encryption
AS Alghamdi, H Ullah, M Mahmud, MK Khan
2009 International Conference on Computational Science and Engineering 2 …, 2009
262009
Development and validation of embedded device for electrocardiogram arrhythmia empowered with transfer learning
RN Asif, S Abbas, MA Khan, K Sultan, M Mahmud, A Mosavi
Computational Intelligence and Neuroscience 2022 (1), 5054641, 2022
202022
A novel cybersecurity framework for countermeasure of SME's in saudi arabia
L Ajmi, N Alqahtani, AU Rahman, M Mahmud
2019 2nd International Conference on Computer Applications & Information …, 2019
192019
Security analysis of firewall rule sets in computer networks
B Khan, MK Khan, M Mahmud, KS Alghathbar
2010 Fourth International Conference on Emerging Security Information …, 2010
162010
MR imaging enhancement and segmentation of tumor using fuzzy curvelet
MA Jaffar, AA Mirza, M Mahmud
International Journal of the Physical Sciences 6 (31), 7242-7246, 2011
152011
Adoption of open innovation and entrepreneurial orientation practices in Malaysian furniture industry
F Wadood, ME Alshaikh, F Akbar, M Mahmud
Entrepreneurial Business and Economics Review 10 (2), 21-40, 2022
132022
Impact of social networking sites (SNSs) on youth
Z Akram, M Mahmud, A Mahmood
Applied Science Reports 11 (1), 6-10, 2015
122015
Information security in business: a bibliometric analysis of the 100 top cited articles
M Mahmud, IU Haq
Library Philosophy and Practice, 1-49, 2021
112021
Assessment of Information Extraction Techniques, Models and Systems.
A Rahman, D Musleh, M Nabil, H Alubaidan, M Gollapalli, G Krishnasamy, ...
Mathematical Modelling of Engineering Problems 9 (3), 2022
102022
Head based tracking
M Ullah, M Mahmud, H Ullah, K Ahmad, AS Imran, FA Cheikh
Electronic Imaging 32, 1-6, 2020
92020
Intrinsic authentication of multimedia objects using biometric data manipulation.
M Mahmud, MK Khan, K Alghathbar, AH Abdullah, MYB Idris
Int. Arab J. Inf. Technol. 9 (4), 336-342, 2012
92012
The system can't perform the operation now. Try again later.
Articles 1–20