Personal information

Activities

Works (26)

A Survey on Security Mechanisms in IoT

International Conference on Emerging Trends in Information Technology and Engineering, ic-ETITE 2020
2020 | Conference paper
EID:

2-s2.0-85085218877

Contributors: Mohammed, A.F.; Qyser, A.A.M.
Source: Self-asserted source
Ahmed Abdul Moiz Qyser via Scopus - Elsevier

Energy efficient key distribution for wireless sensor networks

International Journal of Engineering and Technology(UAE)
2018 | Journal article
EID:

2-s2.0-85053931801

Part of ISSN: 2227524X
Contributors: Kuchipudi, R.; Qyser, A.A.M.; Balaram, V.V.S.S.S.; Manusha Reddy, A.
Source: Self-asserted source
Ahmed Abdul Moiz Qyser via Scopus - Elsevier

Texture classification based on fuzzy similarity texton co-occurrence matrix

International Journal of Innovative Technology and Exploring Engineering
2018 | Journal article
EID:

2-s2.0-85061800348

Part of ISSN: 22783075
Contributors: Srinivas, J.; Qyser, A.A.M.; Eswara Reddy, B.
Source: Self-asserted source
Ahmed Abdul Moiz Qyser via Scopus - Elsevier

Learning from Imbalanced Data of Diverse Strategies with Investigation

2015-06 | Journal article
Part of ISSN: 2277 128X
Source: Self-asserted source
Ahmed Abdul Moiz Qyser

An empirical experimental evaluation on imbalanced data sets with varied imbalance ratio

International Conference on Computing and Communication Technologies, ICCCT 2014
2014 | Conference paper
EID:

2-s2.0-84949926811

Contributors: Imran, M.; Mahmood, A.M.; Qyser, A.A.M.
Source: Self-asserted source
Ahmed Abdul Moiz Qyser via Scopus - Elsevier

Weighted Ranked Queries for secure search in cost-effective clouds

International Conference on Computing and Communication Technologies, ICCCT 2014
2014 | Conference paper
EID:

2-s2.0-84949926680

Contributors: Anand, V.; Qyser, A.A.M.
Source: Self-asserted source
Ahmed Abdul Moiz Qyser via Scopus - Elsevier

A staged capability improvement model for software small and medium enterprises (SMEs)

Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008
2008 | Conference paper
EID:

2-s2.0-67049136373

Contributors: Moiz Qyser, A.A.; Ramachandram Prof., S.; Farhan, A.
Source: Self-asserted source
Ahmed Abdul Moiz Qyser via Scopus - Elsevier

A three-stage model to overcome the challenges faced by Indian software small & medium enterprises (SMEs)

IET Conference Publications
2008 | Conference paper
EID:

2-s2.0-67649922529

Contributors: Moiz Qyser, A.A.; Ramachandram, S.; Moiz, S.A.
Source: Self-asserted source
Ahmed Abdul Moiz Qyser via Scopus - Elsevier

A Dynamic Hierarchical Load Balancing Service Architecture For Cloud Data Centre Virtual Machine Migration

Source: Self-asserted source
Ahmed Abdul Moiz Qyser
grade
Preferred source (of 2)‎

A Dynamic Key Distribution in Wireless Sensor Networks with Reduced Communication Overhead

Source: Self-asserted source
Ahmed Abdul Moiz Qyser
grade
Preferred source (of 2)‎

A Hybrid Approach for Secure Iris-Based Authentication in IOT

Source: Self-asserted source
Ahmed Abdul Moiz Qyser

A Novel Study on Mutual Authentication in IoT using Secure Vaults

Journal issue or edition
Part of ISSN: 2236-6124
Source: Self-asserted source
Ahmed Abdul Moiz Qyser

A Survey of different machine learning models for software defect testing

Journal article
Part of ISSN: 2515-8260
Source: Self-asserted source
Ahmed Abdul Moiz Qyser

A Survey on Security Mechanism In IoT

Source: Self-asserted source
Ahmed Abdul Moiz Qyser

An Efficient Hybrid Dynamic Key Distribution in Wireless Sensor Networks with Reduced Memory Overhead

Source: Self-asserted source
Ahmed Abdul Moiz Qyser
grade
Preferred source (of 2)‎

An Enhanced Efficiency of Key Management Method for Wireless Networks Using Mobile Agents

Source: Self-asserted source
Ahmed Abdul Moiz Qyser
grade
Preferred source (of 2)‎

Classification of Textures based on Circular and Elliptical Weighted Symmetric Texture Matrix

Journal issue or edition
Source: Self-asserted source
Ahmed Abdul Moiz Qyser

Classification of Textures Based on Weighted and Robust Circular Symmetric Local Binary Patterns

Journal issue or edition
Part of ISSN: 1943-023X
Source: Self-asserted source
Ahmed Abdul Moiz Qyser

Cloud Power Deep Learning – Emerging Trends

Journal article
Part of ISSN: 2347-2693
Source: Self-asserted source
Ahmed Abdul Moiz Qyser

Combining Two Factor Authentication and Public Key Encryption To Ensure Authentication in Cloud Computing

Journal article
Part of ISSN: 2455 1457
Source: Self-asserted source
Ahmed Abdul Moiz Qyser

Data Mining of Imbalanced Dataset in Educational Data Using Weka Tool”, International Journal of Engineering Science and Computing

Journal article
Part of ISSN: 2321 3361
Source: Self-asserted source
Ahmed Abdul Moiz Qyser

Exploiting Geo Distributed Datacenters of a Cloud for Load Balancing

IEEE International Advanced Computing Conference (IACC)
Conference paper
Source: Self-asserted source
Ahmed Abdul Moiz Qyser
grade
Preferred source (of 2)‎

Latest developments on dynamic key management for dynamic wireless sensor networks

Source: Self-asserted source
Ahmed Abdul Moiz Qyser
grade
Preferred source (of 2)‎

Mobile Agent Based Key Distribution Approach for Clustered Wireless Sensor Networks

Journal article
Part of ISSN: 0973 6972
Source: Self-asserted source
Ahmed Abdul Moiz Qyser

Security Challenges and Approaches in Wireless Sensor Networks

Source: Self-asserted source
Ahmed Abdul Moiz Qyser

Texture Classification Using Complex Pattern Derived On Micro and Macro Regions

Journal issue or edition
Part of ISSN: 2278-8727
Source: Self-asserted source
Ahmed Abdul Moiz Qyser