[{"keyword":["Depression Detection","Smart Home","Dementia Detection","Smart Home Sensors"],"series_title":"KI2025@HSBI Zukunft im Fokus","project":[{"name":"Institut für Systemdynamik und Mechatronik","_id":"beb248c8-cd75-11ed-b77c-e432b4711f7b"}],"publication_identifier":{"unknown":["2943-3509"]},"type":"conference","corporate_editor":["Schriftenreihe des Institute for Data Science Solutions"],"user_id":"257172","related_material":{"link":[{"url":"https://journals.hsbi.de/sidas/issue/view/29","relation":"confirmation"}]},"date_created":"2025-12-01T10:33:14Z","title":"AI Meets Elderly Care: Mining Smart Home Data for Dementia and Depression Detection","volume":2,"quality_controlled":"1","department":[{"_id":"103"}],"_id":"6355","year":"2025","language":[{"iso":"eng"}],"doi":"10.60802/SIDAS.2025.2","intvolume":"         2","date_updated":"2026-03-17T15:29:29Z","page":"38-39","citation":{"apa":"Attaullah, H., Peters, C., Peters, A., &#38; Jungeblut, T. (2025). AI Meets Elderly Care: Mining Smart Home Data for Dementia and Depression Detection. (Schriftenreihe des Institute for Data Science Solutions, Ed.). Presented at the KI2025@HSBI Zukunft im Fokus, Bielefeld. <a href=\"https://doi.org/10.60802/SIDAS.2025.2\">https://doi.org/10.60802/SIDAS.2025.2</a>","bibtex":"@article{Attaullah_Peters_Peters_Jungeblut_2025, place={Bielefeld}, series={KI2025@HSBI Zukunft im Fokus}, title={AI Meets Elderly Care: Mining Smart Home Data for Dementia and Depression Detection}, volume={2}, DOI={<a href=\"https://doi.org/10.60802/SIDAS.2025.2\">10.60802/SIDAS.2025.2</a>}, author={Attaullah, Hasina and Peters, Christian and Peters, Annika and Jungeblut, Thorsten}, editor={Schriftenreihe des Institute for Data Science SolutionsEditor}, year={2025}, pages={38–39}, collection={KI2025@HSBI Zukunft im Fokus} }","alphadin":"<span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Peters, Christian</span> ; <span style=\"font-variant:small-caps;\">Peters, Annika</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: AI Meets Elderly Care: Mining Smart Home Data for Dementia and Depression Detection. In: <span style=\"font-variant:small-caps;\">Schriftenreihe des Institute for Data Science Solutions</span> (Hrsg.) , <i>KI2025@HSBI Zukunft im Fokus</i>. Bd. 2. Bielefeld (2025)","ieee":"H. Attaullah, C. Peters, A. Peters, and T. Jungeblut, “AI Meets Elderly Care: Mining Smart Home Data for Dementia and Depression Detection,” vol. 2. Bielefeld, pp. 38–39, 2025.","ama":"Attaullah H, Peters C, Peters A, Jungeblut T. AI Meets Elderly Care: Mining Smart Home Data for Dementia and Depression Detection. Schriftenreihe des Institute for Data Science Solutions, ed. 2025;2:38-39. doi:<a href=\"https://doi.org/10.60802/SIDAS.2025.2\">10.60802/SIDAS.2025.2</a>","mla":"Attaullah, Hasina, et al. <i>AI Meets Elderly Care: Mining Smart Home Data for Dementia and Depression Detection</i>. Edited by Schriftenreihe des Institute for Data Science Solutions, vol. 2, 2025, pp. 38–39, doi:<a href=\"https://doi.org/10.60802/SIDAS.2025.2\">10.60802/SIDAS.2025.2</a>.","chicago":"Attaullah, Hasina, Christian Peters, Annika Peters, and Thorsten Jungeblut. “AI Meets Elderly Care: Mining Smart Home Data for Dementia and Depression Detection.” Edited by Schriftenreihe des Institute for Data Science Solutions. KI2025@HSBI Zukunft Im Fokus. Bielefeld, 2025. <a href=\"https://doi.org/10.60802/SIDAS.2025.2\">https://doi.org/10.60802/SIDAS.2025.2</a>.","short":"H. Attaullah, C. Peters, A. Peters, T. Jungeblut, 2 (2025) 38–39."},"author":[{"id":"254998","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-6902-6116/work/198405201","first_name":"Hasina","full_name":"Attaullah, Hasina","orcid":"0000-0002-6902-6116","last_name":"Attaullah"},{"orcid":"0009-0002-7329-0320","full_name":"Peters, Christian","last_name":"Peters","first_name":"Christian","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0002-7329-0320/work/198509977","id":"257329"},{"last_name":"Peters","full_name":"Peters, Annika","first_name":"Annika","id":"257172"},{"last_name":"Jungeblut","orcid":"0000-0001-7425-8766","full_name":"Jungeblut, Thorsten","first_name":"Thorsten","id":"242294"}],"place":"Bielefeld","status":"public","conference":{"name":"KI2025@HSBI Zukunft im Fokus","location":"Bielefeld","start_date":"2025-06-03","end_date":"2025-06-03"}},{"quality_controlled":"1","title":"Digitaler Bahnhof Minden: Künstliche Intelligenz für den Bahnhof der Zukunft","date_created":"2025-10-01T06:42:12Z","user_id":"242294","main_file_link":[{"open_access":"1"}],"publication_identifier":{"issn":["2943-3509"]},"type":"conference","oa":"1","project":[{"name":"Institut für Systemdynamik und Mechatronik","_id":"beb248c8-cd75-11ed-b77c-e432b4711f7b"}],"issue":"2","conference":{"location":"Bielefeld","name":"KI@HSBI 2025 - Zukunft im Fokus","start_date":"2025-06-03"},"status":"public","author":[{"first_name":"Hasina","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-6902-6116/work/193198143","id":"254998","last_name":"Attaullah","orcid":"0000-0002-6902-6116","full_name":"Attaullah, Hasina"},{"full_name":"Halbrügge, Marc","orcid":"0009-0007-3208-1297","last_name":"Halbrügge","id":"256353","first_name":"Marc"},{"orcid":"0009-0004-9338-7343","full_name":"Naumann, Rolf","last_name":"Naumann","first_name":"Rolf","id":"202282"},{"last_name":"Jungeblut","full_name":"Jungeblut, Thorsten","orcid":"0000-0001-7425-8766","id":"242294","first_name":"Thorsten"}],"citation":{"mla":"Attaullah, Hasina, et al. <i>Digitaler Bahnhof Minden: Künstliche Intelligenz für den Bahnhof der Zukunft</i>. no. 2, 2025, pp. 4–5, doi:<a href=\"https://doi.org/10.60802/sidas.2025.2\">10.60802/sidas.2025.2</a>.","ama":"Attaullah H, Halbrügge M, Naumann R, Jungeblut T. Digitaler Bahnhof Minden: Künstliche Intelligenz für den Bahnhof der Zukunft. In: ; 2025:4-5. doi:<a href=\"https://doi.org/10.60802/sidas.2025.2\">10.60802/sidas.2025.2</a>","short":"H. Attaullah, M. Halbrügge, R. Naumann, T. Jungeblut, in: 2025, pp. 4–5.","chicago":"Attaullah, Hasina, Marc Halbrügge, Rolf Naumann, and Thorsten Jungeblut. “Digitaler Bahnhof Minden: Künstliche Intelligenz für den Bahnhof der Zukunft,” 4–5, 2025. <a href=\"https://doi.org/10.60802/sidas.2025.2\">https://doi.org/10.60802/sidas.2025.2</a>.","alphadin":"<span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Halbrügge, Marc</span> ; <span style=\"font-variant:small-caps;\">Naumann, Rolf</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: Digitaler Bahnhof Minden: Künstliche Intelligenz für den Bahnhof der Zukunft. In: , 2025, S. 4–5","bibtex":"@inproceedings{Attaullah_Halbrügge_Naumann_Jungeblut_2025, title={Digitaler Bahnhof Minden: Künstliche Intelligenz für den Bahnhof der Zukunft}, DOI={<a href=\"https://doi.org/10.60802/sidas.2025.2\">10.60802/sidas.2025.2</a>}, number={2}, author={Attaullah, Hasina and Halbrügge, Marc and Naumann, Rolf and Jungeblut, Thorsten}, year={2025}, pages={4–5} }","apa":"Attaullah, H., Halbrügge, M., Naumann, R., &#38; Jungeblut, T. (2025). Digitaler Bahnhof Minden: Künstliche Intelligenz für den Bahnhof der Zukunft (pp. 4–5). Presented at the KI@HSBI 2025 - Zukunft im Fokus, Bielefeld. <a href=\"https://doi.org/10.60802/sidas.2025.2\">https://doi.org/10.60802/sidas.2025.2</a>","ieee":"H. Attaullah, M. Halbrügge, R. Naumann, and T. Jungeblut, “Digitaler Bahnhof Minden: Künstliche Intelligenz für den Bahnhof der Zukunft,” presented at the KI@HSBI 2025 - Zukunft im Fokus, Bielefeld, 2025, no. 2, pp. 4–5."},"page":"4-5","date_updated":"2026-03-17T15:29:27Z","doi":"10.60802/sidas.2025.2","language":[{"iso":"ger"}],"year":"2025","_id":"6204"},{"language":[{"iso":"eng"}],"year":"2025","_id":"6139","status":"public","citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Sanaullah, Sanaullah</span> ; <span style=\"font-variant:small-caps;\">Peters, Annika</span> ; <span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Baudisch, Justin</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: DNA: detecting early signs of neurodegenerative diseases through activity and sleep analysis. In: <i>Frontiers in Neuroscience</i> Bd. 19, Frontiers Media SA (2025)","apa":"Attaullah, H., Sanaullah, S., Peters, A., Ahmed, Q. A., Baudisch, J., &#38; Jungeblut, T. (2025). DNA: detecting early signs of neurodegenerative diseases through activity and sleep analysis. <i>Frontiers in Neuroscience</i>, <i>19</i>. <a href=\"https://doi.org/10.3389/fnins.2025.1617758\">https://doi.org/10.3389/fnins.2025.1617758</a>","bibtex":"@article{Attaullah_Sanaullah_Peters_Ahmed_Baudisch_Jungeblut_2025, title={DNA: detecting early signs of neurodegenerative diseases through activity and sleep analysis}, volume={19}, DOI={<a href=\"https://doi.org/10.3389/fnins.2025.1617758\">10.3389/fnins.2025.1617758</a>}, journal={Frontiers in Neuroscience}, publisher={Frontiers Media SA}, author={Attaullah, Hasina and Sanaullah, Sanaullah and Peters, Annika and Ahmed, Qazi Arbab and Baudisch, Justin and Jungeblut, Thorsten}, year={2025} }","ieee":"H. Attaullah, S. Sanaullah, A. Peters, Q. A. Ahmed, J. Baudisch, and T. Jungeblut, “DNA: detecting early signs of neurodegenerative diseases through activity and sleep analysis,” <i>Frontiers in Neuroscience</i>, vol. 19, 2025.","mla":"Attaullah, Hasina, et al. “DNA: Detecting Early Signs of Neurodegenerative Diseases through Activity and Sleep Analysis.” <i>Frontiers in Neuroscience</i>, vol. 19, Frontiers Media SA, 2025, doi:<a href=\"https://doi.org/10.3389/fnins.2025.1617758\">10.3389/fnins.2025.1617758</a>.","ama":"Attaullah H, Sanaullah S, Peters A, Ahmed QA, Baudisch J, Jungeblut T. DNA: detecting early signs of neurodegenerative diseases through activity and sleep analysis. <i>Frontiers in Neuroscience</i>. 2025;19. doi:<a href=\"https://doi.org/10.3389/fnins.2025.1617758\">10.3389/fnins.2025.1617758</a>","chicago":"Attaullah, Hasina, Sanaullah Sanaullah, Annika Peters, Qazi Arbab Ahmed, Justin Baudisch, and Thorsten Jungeblut. “DNA: Detecting Early Signs of Neurodegenerative Diseases through Activity and Sleep Analysis.” <i>Frontiers in Neuroscience</i> 19 (2025). <a href=\"https://doi.org/10.3389/fnins.2025.1617758\">https://doi.org/10.3389/fnins.2025.1617758</a>.","short":"H. Attaullah, S. Sanaullah, A. Peters, Q.A. Ahmed, J. Baudisch, T. Jungeblut, Frontiers in Neuroscience 19 (2025)."},"author":[{"full_name":"Attaullah, Hasina","orcid":"0000-0002-6902-6116","last_name":"Attaullah","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-6902-6116/work/190160459","id":"254998","first_name":"Hasina"},{"last_name":"Sanaullah","full_name":"Sanaullah, Sanaullah","orcid":"0000-0003-4112-802X","id":"248865","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0003-4112-802X/work/190160461","first_name":"Sanaullah"},{"full_name":"Peters, Annika","last_name":"Peters","id":"257172","first_name":"Annika"},{"orcid":"0000-0002-1837-2254","full_name":"Ahmed, Qazi Arbab","last_name":"Ahmed","first_name":"Qazi Arbab","id":"257333","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/190160462"},{"orcid":"0000-0001-5565-0228","full_name":"Baudisch, Justin","last_name":"Baudisch","first_name":"Justin","id":"247397","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-5565-0228/work/190160463"},{"first_name":"Thorsten","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/190160465","id":"242294","orcid":"0000-0001-7425-8766","full_name":"Jungeblut, Thorsten","last_name":"Jungeblut"}],"publisher":"Frontiers Media SA","date_updated":"2026-03-17T15:29:26Z","intvolume":"        19","doi":"10.3389/fnins.2025.1617758","user_id":"254998","alternative_id":["6354"],"publication_identifier":{"eissn":["1662-453X"]},"type":"journal_article","project":[{"name":"Institut für Systemdynamik und Mechatronik","_id":"beb248c8-cd75-11ed-b77c-e432b4711f7b"}],"publication_status":"published","publication":"Frontiers in Neuroscience","research_group":[{"_id":"f025f82c-c221-11ec-90a2-d82e18d06cb8","name":"CareTech OWL - Zentrum für Gesundheit, Soziales und Technologie"}],"department":[{"_id":"103"}],"volume":19,"title":"DNA: detecting early signs of neurodegenerative diseases through activity and sleep analysis","date_created":"2025-08-20T10:50:06Z"},{"research_group":[{"name":"CareTech OWL - Zentrum für Gesundheit, Soziales und Technologie","_id":"f025f82c-c221-11ec-90a2-d82e18d06cb8"}],"publication":"2024 International Conference on Frontiers of Information Technology (FIT)","publication_status":"published","corporate_editor":["IEEE"],"user_id":"220548","project":[{"name":"TransCareTech - Transformation in Care & Technology","_id":"edf53067-b368-11ed-bde2-9f34a4102af5"}],"publication_identifier":{"eisbn":["979-8-3315-1050-3"]},"type":"conference","date_created":"2025-01-20T17:26:52Z","title":"Improving Transfer Learning and Domain Adaptation in Smart Homes: The Role of Dynamic Domain Adaptation Layer","department":[{"_id":"103"}],"language":[{"iso":"eng"}],"_id":"5336","year":"2024","date_updated":"2026-03-17T15:29:17Z","page":"1-6","publisher":"IEEE","doi":"10.1109/FIT63703.2024.10838396","status":"public","conference":{"name":"2024 International Conference on Frontiers of Information Technology (FIT)","location":"Islamabad, Pakistan","start_date":"2024-12-09","end_date":"2024-12-10"},"citation":{"apa":"Attaullah, H., Kiani, A., &#38; Jungeblut, T. (2024). Improving Transfer Learning and Domain Adaptation in Smart Homes: The Role of Dynamic Domain Adaptation Layer. In IEEE (Ed.), <i>2024 International Conference on Frontiers of Information Technology (FIT)</i> (pp. 1–6). Islamabad, Pakistan: IEEE. <a href=\"https://doi.org/10.1109/FIT63703.2024.10838396\">https://doi.org/10.1109/FIT63703.2024.10838396</a>","bibtex":"@inproceedings{Attaullah_Kiani_Jungeblut_2024, title={Improving Transfer Learning and Domain Adaptation in Smart Homes: The Role of Dynamic Domain Adaptation Layer}, DOI={<a href=\"https://doi.org/10.1109/FIT63703.2024.10838396\">10.1109/FIT63703.2024.10838396</a>}, booktitle={2024 International Conference on Frontiers of Information Technology (FIT)}, publisher={IEEE}, author={Attaullah, Hasina and Kiani, Anum and Jungeblut, Thorsten}, editor={IEEEEditor}, year={2024}, pages={1–6} }","alphadin":"<span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Kiani, Anum</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: Improving Transfer Learning and Domain Adaptation in Smart Homes: The Role of Dynamic Domain Adaptation Layer. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2024 International Conference on Frontiers of Information Technology (FIT)</i> : IEEE, 2024, S. 1–6","ieee":"H. Attaullah, A. Kiani, and T. Jungeblut, “Improving Transfer Learning and Domain Adaptation in Smart Homes: The Role of Dynamic Domain Adaptation Layer,” in <i>2024 International Conference on Frontiers of Information Technology (FIT)</i>, Islamabad, Pakistan, 2024, pp. 1–6.","ama":"Attaullah H, Kiani A, Jungeblut T. Improving Transfer Learning and Domain Adaptation in Smart Homes: The Role of Dynamic Domain Adaptation Layer. In: IEEE, ed. <i>2024 International Conference on Frontiers of Information Technology (FIT)</i>. IEEE; 2024:1-6. doi:<a href=\"https://doi.org/10.1109/FIT63703.2024.10838396\">10.1109/FIT63703.2024.10838396</a>","mla":"Attaullah, Hasina, et al. “Improving Transfer Learning and Domain Adaptation in Smart Homes: The Role of Dynamic Domain Adaptation Layer.” <i>2024 International Conference on Frontiers of Information Technology (FIT)</i>, edited by IEEE, IEEE, 2024, pp. 1–6, doi:<a href=\"https://doi.org/10.1109/FIT63703.2024.10838396\">10.1109/FIT63703.2024.10838396</a>.","chicago":"Attaullah, Hasina, Anum Kiani, and Thorsten Jungeblut. “Improving Transfer Learning and Domain Adaptation in Smart Homes: The Role of Dynamic Domain Adaptation Layer.” In <i>2024 International Conference on Frontiers of Information Technology (FIT)</i>, edited by IEEE, 1–6. IEEE, 2024. <a href=\"https://doi.org/10.1109/FIT63703.2024.10838396\">https://doi.org/10.1109/FIT63703.2024.10838396</a>.","short":"H. Attaullah, A. Kiani, T. Jungeblut, in: IEEE (Ed.), 2024 International Conference on Frontiers of Information Technology (FIT), IEEE, 2024, pp. 1–6."},"author":[{"orcid":"0000-0002-6902-6116","full_name":"Attaullah, Hasina","last_name":"Attaullah","first_name":"Hasina","id":"254998","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-6902-6116/work/176373559"},{"first_name":"Anum","full_name":"Kiani, Anum","last_name":"Kiani"},{"last_name":"Jungeblut","orcid":"0000-0001-7425-8766","full_name":"Jungeblut, Thorsten","first_name":"Thorsten","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/176373560","id":"242294"}]},{"user_id":"220548","project":[{"name":"TransCareTech - Transformation in Care & Technology","_id":"edf53067-b368-11ed-bde2-9f34a4102af5"}],"publication_identifier":{"eissn":["2471-9269"]},"type":"conference","research_group":[{"_id":"f025f82c-c221-11ec-90a2-d82e18d06cb8","name":"CareTech OWL - Zentrum für Gesundheit, Soziales und Technologie"}],"publication":"2024 IEEE 24th International Symposium on Computational Intelligence and Informatics (CINTI)","publication_status":"published","department":[{"_id":"103"}],"date_created":"2025-01-15T10:02:14Z","title":"FL-DL: Fuzzy Logic with Deep Learning, Hybrid Anomaly Detection and Activity Prediction in Smart Homes Data-Sets","language":[{"iso":"eng"}],"_id":"5315","year":"2024","status":"public","conference":{"start_date":"2024-11-19","end_date":"2024-11-21","location":"Budapest, Hungary","name":"2024 IEEE 24th International Symposium on Computational Intelligence and Informatics (CINTI)"},"author":[{"first_name":"Hasina","id":"254998","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-6902-6116/work/175782673","orcid":"0000-0002-6902-6116","full_name":"Attaullah, Hasina","last_name":"Attaullah"},{"full_name":"Sanaullah, Sanaullah","orcid":"0000-0003-4112-802X","last_name":"Sanaullah","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0003-4112-802X/work/175782674","id":"248865","first_name":"Sanaullah"},{"last_name":"Jungeblut","orcid":"0000-0001-7425-8766","full_name":"Jungeblut, Thorsten","first_name":"Thorsten","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/175782675","id":"242294"}],"citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Sanaullah, Sanaullah</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: FL-DL: Fuzzy Logic with Deep Learning, Hybrid Anomaly Detection and Activity Prediction in Smart Homes Data-Sets. In: <i>2024 IEEE 24th International Symposium on Computational Intelligence and Informatics (CINTI)</i>. Budapest, Hungary : IEEE, 2024, S. 43–48","bibtex":"@inproceedings{Attaullah_Sanaullah_Jungeblut_2024, place={Budapest, Hungary}, title={FL-DL: Fuzzy Logic with Deep Learning, Hybrid Anomaly Detection and Activity Prediction in Smart Homes Data-Sets}, DOI={<a href=\"https://doi.org/10.1109/CINTI63048.2024.10830825\">10.1109/CINTI63048.2024.10830825</a>}, booktitle={2024 IEEE 24th International Symposium on Computational Intelligence and Informatics (CINTI)}, publisher={IEEE}, author={Attaullah, Hasina and Sanaullah, Sanaullah and Jungeblut, Thorsten}, year={2024}, pages={43–48} }","apa":"Attaullah, H., Sanaullah, S., &#38; Jungeblut, T. (2024). FL-DL: Fuzzy Logic with Deep Learning, Hybrid Anomaly Detection and Activity Prediction in Smart Homes Data-Sets. In <i>2024 IEEE 24th International Symposium on Computational Intelligence and Informatics (CINTI)</i> (pp. 43–48). Budapest, Hungary: IEEE. <a href=\"https://doi.org/10.1109/CINTI63048.2024.10830825\">https://doi.org/10.1109/CINTI63048.2024.10830825</a>","ieee":"H. Attaullah, S. Sanaullah, and T. Jungeblut, “FL-DL: Fuzzy Logic with Deep Learning, Hybrid Anomaly Detection and Activity Prediction in Smart Homes Data-Sets,” in <i>2024 IEEE 24th International Symposium on Computational Intelligence and Informatics (CINTI)</i>, Budapest, Hungary, 2024, pp. 43–48.","mla":"Attaullah, Hasina, et al. “FL-DL: Fuzzy Logic with Deep Learning, Hybrid Anomaly Detection and Activity Prediction in Smart Homes Data-Sets.” <i>2024 IEEE 24th International Symposium on Computational Intelligence and Informatics (CINTI)</i>, IEEE, 2024, pp. 43–48, doi:<a href=\"https://doi.org/10.1109/CINTI63048.2024.10830825\">10.1109/CINTI63048.2024.10830825</a>.","ama":"Attaullah H, Sanaullah S, Jungeblut T. FL-DL: Fuzzy Logic with Deep Learning, Hybrid Anomaly Detection and Activity Prediction in Smart Homes Data-Sets. In: <i>2024 IEEE 24th International Symposium on Computational Intelligence and Informatics (CINTI)</i>. Budapest, Hungary: IEEE; 2024:43-48. doi:<a href=\"https://doi.org/10.1109/CINTI63048.2024.10830825\">10.1109/CINTI63048.2024.10830825</a>","chicago":"Attaullah, Hasina, Sanaullah Sanaullah, and Thorsten Jungeblut. “FL-DL: Fuzzy Logic with Deep Learning, Hybrid Anomaly Detection and Activity Prediction in Smart Homes Data-Sets.” In <i>2024 IEEE 24th International Symposium on Computational Intelligence and Informatics (CINTI)</i>, 43–48. Budapest, Hungary: IEEE, 2024. <a href=\"https://doi.org/10.1109/CINTI63048.2024.10830825\">https://doi.org/10.1109/CINTI63048.2024.10830825</a>.","short":"H. Attaullah, S. Sanaullah, T. Jungeblut, in: 2024 IEEE 24th International Symposium on Computational Intelligence and Informatics (CINTI), IEEE, Budapest, Hungary, 2024, pp. 43–48."},"place":"Budapest, Hungary","date_updated":"2026-03-17T15:29:16Z","publisher":"IEEE","page":"43-48","doi":"10.1109/CINTI63048.2024.10830825"},{"author":[{"first_name":"Sanaullah","id":"248865","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0003-4112-802X/work/171159471","orcid":"0000-0003-4112-802X","full_name":"Sanaullah, Sanaullah","last_name":"Sanaullah"},{"last_name":"Attaullah","full_name":"Attaullah, Hasina","orcid":"0000-0002-6902-6116","id":"254998","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-6902-6116/work/171438589","first_name":"Hasina"},{"last_name":"Jungeblut","full_name":"Jungeblut, Thorsten","orcid":"0000-0001-7425-8766","id":"242294","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/171159473","first_name":"Thorsten"}],"citation":{"short":"S. Sanaullah, H. Attaullah, T. Jungeblut, in: U. Kuhl, DataNinja.nrw (Eds.), Proceedings of the SAIOnARA Conference, DataNinja sAIOnARA Conference, 2024.","chicago":"Sanaullah, Sanaullah, Hasina Attaullah, and Thorsten Jungeblut. “Trade-Offs Between Privacy and Performance in Encrypted Dataset Using Machine Learning Models.” In <i>Proceedings of the SAIOnARA Conference</i>, edited by Ulrike  Kuhl and DataNinja.nrw. DataNinja sAIOnARA Conference, 2024. <a href=\"https://doi.org/10.11576/DATANINJA-1166\">https://doi.org/10.11576/DATANINJA-1166</a>.","mla":"Sanaullah, Sanaullah, et al. “Trade-Offs Between Privacy and Performance in Encrypted Dataset Using Machine Learning Models.” <i>Proceedings of the SAIOnARA Conference</i>, edited by Ulrike  Kuhl and DataNinja.nrw, DataNinja sAIOnARA Conference, 2024, doi:<a href=\"https://doi.org/10.11576/DATANINJA-1166\">10.11576/DATANINJA-1166</a>.","ama":"Sanaullah S, Attaullah H, Jungeblut T. Trade-offs Between Privacy and Performance in Encrypted Dataset using Machine Learning Models. In: Kuhl U, DataNinja.nrw, eds. <i>Proceedings of the SAIOnARA Conference</i>. DataNinja sAIOnARA Conference; 2024. doi:<a href=\"https://doi.org/10.11576/DATANINJA-1166\">10.11576/DATANINJA-1166</a>","ieee":"S. Sanaullah, H. Attaullah, and T. Jungeblut, “Trade-offs Between Privacy and Performance in Encrypted Dataset using Machine Learning Models,” in <i>Proceedings of the sAIOnARA Conference</i>, Bielefeld, 2024.","alphadin":"<span style=\"font-variant:small-caps;\">Sanaullah, Sanaullah</span> ; <span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: Trade-offs Between Privacy and Performance in Encrypted Dataset using Machine Learning Models. In: <span style=\"font-variant:small-caps;\">Kuhl, U.</span> ; <span style=\"font-variant:small-caps;\">DataNinja.nrw</span> (Hrsg.): <i>Proceedings of the sAIOnARA Conference</i> : DataNinja sAIOnARA Conference, 2024","bibtex":"@inproceedings{Sanaullah_Attaullah_Jungeblut_2024, title={Trade-offs Between Privacy and Performance in Encrypted Dataset using Machine Learning Models}, DOI={<a href=\"https://doi.org/10.11576/DATANINJA-1166\">10.11576/DATANINJA-1166</a>}, booktitle={Proceedings of the sAIOnARA Conference}, publisher={DataNinja sAIOnARA Conference}, author={Sanaullah, Sanaullah and Attaullah, Hasina and Jungeblut, Thorsten}, editor={Kuhl, Ulrike  and DataNinja.nrwEditors}, year={2024} }","apa":"Sanaullah, S., Attaullah, H., &#38; Jungeblut, T. (2024). Trade-offs Between Privacy and Performance in Encrypted Dataset using Machine Learning Models. In U. Kuhl &#38; DataNinja.nrw (Eds.), <i>Proceedings of the sAIOnARA Conference</i>. Bielefeld: DataNinja sAIOnARA Conference. <a href=\"https://doi.org/10.11576/DATANINJA-1166\">https://doi.org/10.11576/DATANINJA-1166</a>"},"status":"public","conference":{"end_date":"2024-06-27","start_date":"2024-06-25","name":"sAIOnARA Conference","location":"Bielefeld"},"doi":"10.11576/DATANINJA-1166","date_updated":"2026-03-17T15:29:13Z","publisher":"DataNinja sAIOnARA Conference","editor":[{"first_name":"Ulrike ","full_name":"Kuhl, Ulrike ","last_name":"Kuhl"}],"_id":"5096","year":"2024","language":[{"iso":"eng"}],"department":[{"_id":"1"}],"date_created":"2024-11-07T08:50:20Z","title":"Trade-offs Between Privacy and Performance in Encrypted Dataset using Machine Learning Models","type":"conference","corporate_editor":["DataNinja.nrw"],"user_id":"220548","publication":"Proceedings of the sAIOnARA Conference","publication_status":"published"},{"date_created":"2024-11-07T08:52:45Z","title":"Encryption Techniques for Privacy-Preserving CNN Models: Performance and Practicality in Urban AI Applications","publication_identifier":{"isbn":["9798400711565"]},"type":"conference","user_id":"220548","publication":"Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Advances in Urban-AI","publication_status":"published","citation":{"bibtex":"@inproceedings{Sanaullah_Attaullah_Jungeblut_2024, place={New York, NY, USA}, title={Encryption Techniques for Privacy-Preserving CNN Models: Performance and Practicality in Urban AI Applications}, DOI={<a href=\"https://doi.org/10.1145/3681780.3697244\">10.1145/3681780.3697244</a>}, booktitle={Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Advances in Urban-AI}, publisher={ACM}, author={Sanaullah, Sanaullah and Attaullah, Hasina and Jungeblut, Thorsten}, editor={Omitaomu, Olufemi A. and Mostafavi, Ali and Randhawa, Sukanya and Niu, HaoranEditors}, year={2024}, pages={50–53} }","apa":"Sanaullah, S., Attaullah, H., &#38; Jungeblut, T. (2024). Encryption Techniques for Privacy-Preserving CNN Models: Performance and Practicality in Urban AI Applications. In O. A. Omitaomu, A. Mostafavi, S. Randhawa, &#38; H. Niu (Eds.), <i>Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Advances in Urban-AI</i> (pp. 50–53). New York, NY, USA: ACM. <a href=\"https://doi.org/10.1145/3681780.3697244\">https://doi.org/10.1145/3681780.3697244</a>","alphadin":"<span style=\"font-variant:small-caps;\">Sanaullah, Sanaullah</span> ; <span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: Encryption Techniques for Privacy-Preserving CNN Models: Performance and Practicality in Urban AI Applications. In: <span style=\"font-variant:small-caps;\">Omitaomu, O. A.</span> ; <span style=\"font-variant:small-caps;\">Mostafavi, A.</span> ; <span style=\"font-variant:small-caps;\">Randhawa, S.</span> ; <span style=\"font-variant:small-caps;\">Niu, H.</span> (Hrsg.): <i>Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Advances in Urban-AI</i>. New York, NY, USA : ACM, 2024, S. 50–53","ieee":"S. Sanaullah, H. Attaullah, and T. Jungeblut, “Encryption Techniques for Privacy-Preserving CNN Models: Performance and Practicality in Urban AI Applications,” in <i>Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Advances in Urban-AI</i>, Atlanta GA USA, 2024, pp. 50–53.","ama":"Sanaullah S, Attaullah H, Jungeblut T. Encryption Techniques for Privacy-Preserving CNN Models: Performance and Practicality in Urban AI Applications. In: Omitaomu OA, Mostafavi A, Randhawa S, Niu H, eds. <i>Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Advances in Urban-AI</i>. New York, NY, USA: ACM; 2024:50-53. doi:<a href=\"https://doi.org/10.1145/3681780.3697244\">10.1145/3681780.3697244</a>","mla":"Sanaullah, Sanaullah, et al. “Encryption Techniques for Privacy-Preserving CNN Models: Performance and Practicality in Urban AI Applications.” <i>Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Advances in Urban-AI</i>, edited by Olufemi A. Omitaomu et al., ACM, 2024, pp. 50–53, doi:<a href=\"https://doi.org/10.1145/3681780.3697244\">10.1145/3681780.3697244</a>.","chicago":"Sanaullah, Sanaullah, Hasina Attaullah, and Thorsten Jungeblut. “Encryption Techniques for Privacy-Preserving CNN Models: Performance and Practicality in Urban AI Applications.” In <i>Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Advances in Urban-AI</i>, edited by Olufemi A. Omitaomu, Ali Mostafavi, Sukanya Randhawa, and Haoran Niu, 50–53. New York, NY, USA: ACM, 2024. <a href=\"https://doi.org/10.1145/3681780.3697244\">https://doi.org/10.1145/3681780.3697244</a>.","short":"S. Sanaullah, H. Attaullah, T. Jungeblut, in: O.A. Omitaomu, A. Mostafavi, S. Randhawa, H. Niu (Eds.), Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Advances in Urban-AI, ACM, New York, NY, USA, 2024, pp. 50–53."},"author":[{"first_name":"Sanaullah","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0003-4112-802X/work/171159565","id":"248865","last_name":"Sanaullah","orcid":"0000-0003-4112-802X","full_name":"Sanaullah, Sanaullah"},{"full_name":"Attaullah, Hasina","orcid":"0000-0002-6902-6116","last_name":"Attaullah","id":"254998","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-6902-6116/work/171438641","first_name":"Hasina"},{"first_name":"Thorsten","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/171159566","id":"242294","last_name":"Jungeblut","orcid":"0000-0001-7425-8766","full_name":"Jungeblut, Thorsten"}],"place":"New York, NY, USA","status":"public","conference":{"name":"SIGSPATIAL '24: The 32nd ACM International Conference on Advances in Geographic Information Systems","location":"Atlanta GA USA","start_date":"2024-10-29","end_date":"2024-11-01"},"doi":"10.1145/3681780.3697244","date_updated":"2026-03-17T15:29:13Z","page":"50-53","publisher":"ACM","_id":"5098","editor":[{"full_name":"Omitaomu, Olufemi A.","last_name":"Omitaomu","first_name":"Olufemi A."},{"full_name":"Mostafavi, Ali","last_name":"Mostafavi","first_name":"Ali"},{"last_name":"Randhawa","full_name":"Randhawa, Sukanya","first_name":"Sukanya"},{"first_name":"Haoran","last_name":"Niu","full_name":"Niu, Haoran"}],"year":"2024","language":[{"iso":"eng"}]},{"department":[{"_id":"103"}],"volume":14,"title":"Analyzing Machine Learning Models for Activity Recognition Using Homomorphically Encrypted Real-World Smart Home Datasets: A Case Study","file_date_updated":"2024-10-18T07:27:27Z","date_created":"2024-10-07T14:35:30Z","user_id":"220548","main_file_link":[{"url":"https://www.mdpi.com/2076-3417/14/19/9047","open_access":"1"}],"alternative_id":["5020"],"type":"journal_article","publication_identifier":{"eissn":["2076-3417"]},"file":[{"success":1,"date_updated":"2024-10-18T07:27:27Z","creator":"arichert1","date_created":"2024-10-18T07:27:27Z","file_name":"applsci-14-09047.pdf","file_size":1189566,"content_type":"application/pdf","file_id":"5062","relation":"main_file","access_level":"open_access"}],"oa":"1","tmp":{"short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png"},"has_accepted_license":"1","publication_status":"published","publication":"Applied Sciences","issue":"19","urn":"urn:nbn:de:hbz:bi10-50201","status":"public","author":[{"last_name":"Attaullah","full_name":"Attaullah, Hasina","orcid":"0000-0002-6902-6116","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-6902-6116/work/169817686","id":"254998","first_name":"Hasina"},{"full_name":"Sanaullah, Sanaullah","orcid":"0000-0003-4112-802X","last_name":"Sanaullah","id":"248865","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0003-4112-802X/work/169817688","first_name":"Sanaullah"},{"orcid":"0000-0001-7425-8766","full_name":"Jungeblut, Thorsten","last_name":"Jungeblut","first_name":"Thorsten","id":"242294","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/169817690"}],"citation":{"ieee":"H. Attaullah, S. Sanaullah, and T. Jungeblut, “Analyzing Machine Learning Models for Activity Recognition Using Homomorphically Encrypted Real-World Smart Home Datasets: A Case Study,” <i>Applied Sciences</i>, vol. 14, no. 19, 2024.","apa":"Attaullah, H., Sanaullah, S., &#38; Jungeblut, T. (2024). Analyzing Machine Learning Models for Activity Recognition Using Homomorphically Encrypted Real-World Smart Home Datasets: A Case Study. <i>Applied Sciences</i>, <i>14</i>(19). <a href=\"https://doi.org/10.3390/app14199047\">https://doi.org/10.3390/app14199047</a>","bibtex":"@article{Attaullah_Sanaullah_Jungeblut_2024, title={Analyzing Machine Learning Models for Activity Recognition Using Homomorphically Encrypted Real-World Smart Home Datasets: A Case Study}, volume={14}, DOI={<a href=\"https://doi.org/10.3390/app14199047\">10.3390/app14199047</a>}, number={199047}, journal={Applied Sciences}, publisher={MDPI AG}, author={Attaullah, Hasina and Sanaullah, Sanaullah and Jungeblut, Thorsten}, year={2024} }","alphadin":"<span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Sanaullah, Sanaullah</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: Analyzing Machine Learning Models for Activity Recognition Using Homomorphically Encrypted Real-World Smart Home Datasets: A Case Study. In: <i>Applied Sciences</i> Bd. 14, MDPI AG (2024), Nr. 19","short":"H. Attaullah, S. Sanaullah, T. Jungeblut, Applied Sciences 14 (2024).","chicago":"Attaullah, Hasina, Sanaullah Sanaullah, and Thorsten Jungeblut. “Analyzing Machine Learning Models for Activity Recognition Using Homomorphically Encrypted Real-World Smart Home Datasets: A Case Study.” <i>Applied Sciences</i> 14, no. 19 (2024). <a href=\"https://doi.org/10.3390/app14199047\">https://doi.org/10.3390/app14199047</a>.","ama":"Attaullah H, Sanaullah S, Jungeblut T. Analyzing Machine Learning Models for Activity Recognition Using Homomorphically Encrypted Real-World Smart Home Datasets: A Case Study. <i>Applied Sciences</i>. 2024;14(19). doi:<a href=\"https://doi.org/10.3390/app14199047\">10.3390/app14199047</a>","mla":"Attaullah, Hasina, et al. “Analyzing Machine Learning Models for Activity Recognition Using Homomorphically Encrypted Real-World Smart Home Datasets: A Case Study.” <i>Applied Sciences</i>, vol. 14, no. 19, 9047, MDPI AG, 2024, doi:<a href=\"https://doi.org/10.3390/app14199047\">10.3390/app14199047</a>."},"publisher":"MDPI AG","date_updated":"2026-03-17T15:29:11Z","intvolume":"        14","doi":"10.3390/app14199047","language":[{"iso":"eng"}],"year":"2024","_id":"4997","article_number":"9047"},{"type":"conference","publication_identifier":{"isbn":["9798400706349"]},"user_id":"220548","alternative_id":["4807"],"publication_status":"published","publication":"Companion Proceedings of the 8th International Conference on the Art, Science, and Engineering of Programming","title":"The Next-Gen Interactive Runtime Simulator for Neural Network Programming","date_created":"2024-07-11T07:31:44Z","year":"2024","editor":[{"last_name":"Söderberg","full_name":"Söderberg, Emma","first_name":"Emma"},{"last_name":"Church","full_name":"Church, Luke","first_name":"Luke"}],"_id":"4811","language":[{"iso":"eng"}],"place":"New York, NY, USA","citation":{"chicago":"Sanaullah, Sanaullah, Hasina Attaullah, and Thorsten Jungeblut. “The Next-Gen Interactive Runtime Simulator for Neural Network Programming.” In <i>Companion Proceedings of the 8th International Conference on the Art, Science, and Engineering of Programming</i>, edited by Emma Söderberg and Luke Church, 8–10. New York, NY, USA: ACM, 2024. <a href=\"https://doi.org/10.1145/3660829.3660833\">https://doi.org/10.1145/3660829.3660833</a>.","short":"S. Sanaullah, H. Attaullah, T. Jungeblut, in: E. Söderberg, L. Church (Eds.), Companion Proceedings of the 8th International Conference on the Art, Science, and Engineering of Programming, ACM, New York, NY, USA, 2024, pp. 8–10.","ama":"Sanaullah S, Attaullah H, Jungeblut T. The Next-Gen Interactive Runtime Simulator for Neural Network Programming. In: Söderberg E, Church L, eds. <i>Companion Proceedings of the 8th International Conference on the Art, Science, and Engineering of Programming</i>. New York, NY, USA: ACM; 2024:8-10. doi:<a href=\"https://doi.org/10.1145/3660829.3660833\">10.1145/3660829.3660833</a>","mla":"Sanaullah, Sanaullah, et al. “The Next-Gen Interactive Runtime Simulator for Neural Network Programming.” <i>Companion Proceedings of the 8th International Conference on the Art, Science, and Engineering of Programming</i>, edited by Emma Söderberg and Luke Church, ACM, 2024, pp. 8–10, doi:<a href=\"https://doi.org/10.1145/3660829.3660833\">10.1145/3660829.3660833</a>.","ieee":"S. Sanaullah, H. Attaullah, and T. Jungeblut, “The Next-Gen Interactive Runtime Simulator for Neural Network Programming,” in <i>Companion Proceedings of the 8th International Conference on the Art, Science, and Engineering of Programming</i>, Lund Sweden, 2024, pp. 8–10.","apa":"Sanaullah, S., Attaullah, H., &#38; Jungeblut, T. (2024). The Next-Gen Interactive Runtime Simulator for Neural Network Programming. In E. Söderberg &#38; L. Church (Eds.), <i>Companion Proceedings of the 8th International Conference on the Art, Science, and Engineering of Programming</i> (pp. 8–10). New York, NY, USA: ACM. <a href=\"https://doi.org/10.1145/3660829.3660833\">https://doi.org/10.1145/3660829.3660833</a>","bibtex":"@inproceedings{Sanaullah_Attaullah_Jungeblut_2024, place={New York, NY, USA}, title={The Next-Gen Interactive Runtime Simulator for Neural Network Programming}, DOI={<a href=\"https://doi.org/10.1145/3660829.3660833\">10.1145/3660829.3660833</a>}, booktitle={Companion Proceedings of the 8th International Conference on the Art, Science, and Engineering of Programming}, publisher={ACM}, author={Sanaullah, Sanaullah and Attaullah, Hasina and Jungeblut, Thorsten}, editor={Söderberg, Emma and Church, LukeEditors}, year={2024}, pages={8–10} }","alphadin":"<span style=\"font-variant:small-caps;\">Sanaullah, Sanaullah</span> ; <span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: The Next-Gen Interactive Runtime Simulator for Neural Network Programming. In: <span style=\"font-variant:small-caps;\">Söderberg, E.</span> ; <span style=\"font-variant:small-caps;\">Church, L.</span> (Hrsg.): <i>Companion Proceedings of the 8th International Conference on the Art, Science, and Engineering of Programming</i>. New York, NY, USA : ACM, 2024, S. 8–10"},"author":[{"last_name":"Sanaullah","full_name":"Sanaullah, Sanaullah","orcid":"0000-0003-4112-802X","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0003-4112-802X/work/164231178","id":"248865","first_name":"Sanaullah"},{"orcid":"0000-0002-6902-6116","full_name":"Attaullah, Hasina","last_name":"Attaullah","first_name":"Hasina","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-6902-6116/work/164231180","id":"254998"},{"last_name":"Jungeblut","orcid":"0000-0001-7425-8766","full_name":"Jungeblut, Thorsten","first_name":"Thorsten","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/164231183","id":"242294"}],"conference":{"start_date":"2024-03-11","end_date":"2024-03-15","location":"Lund Sweden","name":"‹Programming› '24: 8th International Conference on the Art, Science, and Engineering of Programming"},"status":"public","doi":"10.1145/3660829.3660833","page":"8-10","publisher":"ACM","date_updated":"2026-03-17T15:29:06Z"},{"year":"2023","_id":"4801","language":[{"iso":"eng"}],"author":[{"first_name":"Tehsin","full_name":"Kanwal, Tehsin","last_name":"Kanwal"},{"id":"254998","first_name":"Hasina","last_name":"Attaullah","full_name":"Attaullah, Hasina","orcid":"0000-0002-6902-6116"},{"first_name":"Adeel","full_name":"Anjum, Adeel","last_name":"Anjum"},{"first_name":"Abid","full_name":"Khan, Abid","last_name":"Khan"},{"first_name":"Gwanggil","full_name":"Jeon, Gwanggil","last_name":"Jeon"}],"citation":{"ieee":"T. Kanwal, H. Attaullah, A. Anjum, A. Khan, and G. Jeon, “Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches,” <i>Digital Communications and Networks</i>, vol. 9, no. 5, pp. 1131–1140, 2023.","alphadin":"<span style=\"font-variant:small-caps;\">Kanwal, Tehsin</span> ; <span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Anjum, Adeel</span> ; <span style=\"font-variant:small-caps;\">Khan, Abid</span> ; <span style=\"font-variant:small-caps;\">Jeon, Gwanggil</span>: Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches. In: <i>Digital Communications and Networks</i> Bd. 9, Elsevier BV (2023), Nr. 5, S. 1131–1140","bibtex":"@article{Kanwal_Attaullah_Anjum_Khan_Jeon_2023, title={Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches}, volume={9}, DOI={<a href=\"https://doi.org/10.1016/j.dcan.2022.09.025\">10.1016/j.dcan.2022.09.025</a>}, number={5}, journal={Digital Communications and Networks}, publisher={Elsevier BV}, author={Kanwal, Tehsin and Attaullah, Hasina and Anjum, Adeel and Khan, Abid and Jeon, Gwanggil}, year={2023}, pages={1131–1140} }","apa":"Kanwal, T., Attaullah, H., Anjum, A., Khan, A., &#38; Jeon, G. (2023). Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches. <i>Digital Communications and Networks</i>, <i>9</i>(5), 1131–1140. <a href=\"https://doi.org/10.1016/j.dcan.2022.09.025\">https://doi.org/10.1016/j.dcan.2022.09.025</a>","short":"T. Kanwal, H. Attaullah, A. Anjum, A. Khan, G. Jeon, Digital Communications and Networks 9 (2023) 1131–1140.","chicago":"Kanwal, Tehsin, Hasina Attaullah, Adeel Anjum, Abid Khan, and Gwanggil Jeon. “Fuzz-Classification (p, l)-Angel: An Enhanced Hybrid Artificial Intelligence Based Fuzzy Logic for Multiple Sensitive Attributes against Privacy Breaches.” <i>Digital Communications and Networks</i> 9, no. 5 (2023): 1131–40. <a href=\"https://doi.org/10.1016/j.dcan.2022.09.025\">https://doi.org/10.1016/j.dcan.2022.09.025</a>.","mla":"Kanwal, Tehsin, et al. “Fuzz-Classification (p, l)-Angel: An Enhanced Hybrid Artificial Intelligence Based Fuzzy Logic for Multiple Sensitive Attributes against Privacy Breaches.” <i>Digital Communications and Networks</i>, vol. 9, no. 5, Elsevier BV, 2023, pp. 1131–40, doi:<a href=\"https://doi.org/10.1016/j.dcan.2022.09.025\">10.1016/j.dcan.2022.09.025</a>.","ama":"Kanwal T, Attaullah H, Anjum A, Khan A, Jeon G. Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches. <i>Digital Communications and Networks</i>. 2023;9(5):1131-1140. doi:<a href=\"https://doi.org/10.1016/j.dcan.2022.09.025\">10.1016/j.dcan.2022.09.025</a>"},"status":"public","intvolume":"         9","doi":"10.1016/j.dcan.2022.09.025","page":"1131-1140","publisher":"Elsevier BV","date_updated":"2026-03-17T15:29:06Z","publication_identifier":{"issn":["2352-8648"]},"type":"journal_article","user_id":"220548","publication":"Digital Communications and Networks","publication_status":"published","issue":"5","title":"Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches","date_created":"2024-07-10T14:44:48Z","volume":9},{"publication_status":"published","publication":"IEEE Internet of Things Journal","issue":"6","type":"journal_article","publication_identifier":{"eissn":["2327-4662","2372-2541"]},"alternative_id":["4808"],"user_id":"220548","date_created":"2024-07-10T14:44:49Z","title":"Fuzzy-Logic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data","volume":9,"_id":"4802","year":"2022","language":[{"iso":"eng"}],"doi":"10.1109/JIOT.2021.3103939","intvolume":"         9","date_updated":"2026-03-17T15:29:06Z","page":"4411-4420","publisher":"Institute of Electrical and Electronics Engineers (IEEE)","citation":{"ieee":"H. Attaullah <i>et al.</i>, “Fuzzy-Logic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data,” <i>IEEE Internet of Things Journal</i>, vol. 9, no. 6, pp. 4411–4420, 2022.","alphadin":"<span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Kanwal, Tehsin</span> ; <span style=\"font-variant:small-caps;\">Anjum, Adeel</span> ; <span style=\"font-variant:small-caps;\">Ahmed, Ghufran</span> ; <span style=\"font-variant:small-caps;\">Khan, Suleman</span> ; <span style=\"font-variant:small-caps;\">Rawat, Danda B.</span> ; <span style=\"font-variant:small-caps;\">Khan, Rizwan</span>: Fuzzy-Logic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data. In: <i>IEEE Internet of Things Journal</i> Bd. 9, Institute of Electrical and Electronics Engineers (IEEE) (2022), Nr. 6, S. 4411–4420","bibtex":"@article{Attaullah_Kanwal_Anjum_Ahmed_Khan_Rawat_Khan_2022, title={Fuzzy-Logic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data}, volume={9}, DOI={<a href=\"https://doi.org/10.1109/JIOT.2021.3103939\">10.1109/JIOT.2021.3103939</a>}, number={6}, journal={IEEE Internet of Things Journal}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Attaullah, Hasina and Kanwal, Tehsin and Anjum, Adeel and Ahmed, Ghufran and Khan, Suleman and Rawat, Danda B. and Khan, Rizwan}, year={2022}, pages={4411–4420} }","apa":"Attaullah, H., Kanwal, T., Anjum, A., Ahmed, G., Khan, S., Rawat, D. B., &#38; Khan, R. (2022). Fuzzy-Logic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data. <i>IEEE Internet of Things Journal</i>, <i>9</i>(6), 4411–4420. <a href=\"https://doi.org/10.1109/JIOT.2021.3103939\">https://doi.org/10.1109/JIOT.2021.3103939</a>","short":"H. Attaullah, T. Kanwal, A. Anjum, G. Ahmed, S. Khan, D.B. Rawat, R. Khan, IEEE Internet of Things Journal 9 (2022) 4411–4420.","chicago":"Attaullah, Hasina, Tehsin Kanwal, Adeel Anjum, Ghufran Ahmed, Suleman Khan, Danda B. Rawat, and Rizwan Khan. “Fuzzy-Logic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data.” <i>IEEE Internet of Things Journal</i> 9, no. 6 (2022): 4411–20. <a href=\"https://doi.org/10.1109/JIOT.2021.3103939\">https://doi.org/10.1109/JIOT.2021.3103939</a>.","mla":"Attaullah, Hasina, et al. “Fuzzy-Logic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data.” <i>IEEE Internet of Things Journal</i>, vol. 9, no. 6, Institute of Electrical and Electronics Engineers (IEEE), 2022, pp. 4411–20, doi:<a href=\"https://doi.org/10.1109/JIOT.2021.3103939\">10.1109/JIOT.2021.3103939</a>.","ama":"Attaullah H, Kanwal T, Anjum A, et al. Fuzzy-Logic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data. <i>IEEE Internet of Things Journal</i>. 2022;9(6):4411-4420. doi:<a href=\"https://doi.org/10.1109/JIOT.2021.3103939\">10.1109/JIOT.2021.3103939</a>"},"author":[{"id":"254998","first_name":"Hasina","last_name":"Attaullah","full_name":"Attaullah, Hasina","orcid":"0000-0002-6902-6116"},{"first_name":"Tehsin","full_name":"Kanwal, Tehsin","last_name":"Kanwal"},{"first_name":"Adeel","last_name":"Anjum","full_name":"Anjum, Adeel"},{"first_name":"Ghufran","full_name":"Ahmed, Ghufran","last_name":"Ahmed"},{"last_name":"Khan","full_name":"Khan, Suleman","first_name":"Suleman"},{"first_name":"Danda B.","last_name":"Rawat","full_name":"Rawat, Danda B."},{"first_name":"Rizwan","last_name":"Khan","full_name":"Khan, Rizwan"}],"status":"public"},{"publisher":"MDPI AG","date_updated":"2026-03-17T15:29:06Z","intvolume":"        21","doi":"10.3390/s21144933","status":"public","author":[{"id":"254998","first_name":"Hasina","last_name":"Attaullah","full_name":"Attaullah, Hasina","orcid":"0000-0002-6902-6116"},{"first_name":"Adeel","full_name":"Anjum, Adeel","last_name":"Anjum"},{"first_name":"Tehsin","last_name":"Kanwal","full_name":"Kanwal, Tehsin"},{"first_name":"Saif Ur Rehman","last_name":"Malik","full_name":"Malik, Saif Ur Rehman"},{"last_name":"Asheralieva","full_name":"Asheralieva, Alia","first_name":"Alia"},{"first_name":"Hassan","last_name":"Malik","full_name":"Malik, Hassan"},{"first_name":"Ahmed","last_name":"Zoha","full_name":"Zoha, Ahmed"},{"last_name":"Arshad","full_name":"Arshad, Kamran","first_name":"Kamran"},{"full_name":"Imran, Muhammad Ali","last_name":"Imran","first_name":"Muhammad Ali"}],"citation":{"apa":"Attaullah, H., Anjum, A., Kanwal, T., Malik, S. U. R., Asheralieva, A., Malik, H., … Imran, M. A. (2021). F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes. <i>Sensors</i>, <i>21</i>(14). <a href=\"https://doi.org/10.3390/s21144933\">https://doi.org/10.3390/s21144933</a>","bibtex":"@article{Attaullah_Anjum_Kanwal_Malik_Asheralieva_Malik_Zoha_Arshad_Imran_2021, title={F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes}, volume={21}, DOI={<a href=\"https://doi.org/10.3390/s21144933\">10.3390/s21144933</a>}, number={144933}, journal={Sensors}, publisher={MDPI AG}, author={Attaullah, Hasina and Anjum, Adeel and Kanwal, Tehsin and Malik, Saif Ur Rehman and Asheralieva, Alia and Malik, Hassan and Zoha, Ahmed and Arshad, Kamran and Imran, Muhammad Ali}, year={2021} }","alphadin":"<span style=\"font-variant:small-caps;\"><span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Anjum, Adeel</span> ; <span style=\"font-variant:small-caps;\">Kanwal, Tehsin</span> ; <span style=\"font-variant:small-caps;\">Malik, Saif Ur Rehman</span> ; <span style=\"font-variant:small-caps;\">Asheralieva, Alia</span> ; <span style=\"font-variant:small-caps;\">Malik, Hassan</span> ; <span style=\"font-variant:small-caps;\">Zoha, Ahmed</span> ; <span style=\"font-variant:small-caps;\">Arshad, Kamran</span> ; u. a.</span>: F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes. In: <i>Sensors</i> Bd. 21, MDPI AG (2021), Nr. 14","ieee":"H. Attaullah <i>et al.</i>, “F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes,” <i>Sensors</i>, vol. 21, no. 14, 2021.","ama":"Attaullah H, Anjum A, Kanwal T, et al. F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes. <i>Sensors</i>. 2021;21(14). doi:<a href=\"https://doi.org/10.3390/s21144933\">10.3390/s21144933</a>","mla":"Attaullah, Hasina, et al. “F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes.” <i>Sensors</i>, vol. 21, no. 14, 4933, MDPI AG, 2021, doi:<a href=\"https://doi.org/10.3390/s21144933\">10.3390/s21144933</a>.","chicago":"Attaullah, Hasina, Adeel Anjum, Tehsin Kanwal, Saif Ur Rehman Malik, Alia Asheralieva, Hassan Malik, Ahmed Zoha, Kamran Arshad, and Muhammad Ali Imran. “F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes.” <i>Sensors</i> 21, no. 14 (2021). <a href=\"https://doi.org/10.3390/s21144933\">https://doi.org/10.3390/s21144933</a>.","short":"H. Attaullah, A. Anjum, T. Kanwal, S.U.R. Malik, A. Asheralieva, H. Malik, A. Zoha, K. Arshad, M.A. Imran, Sensors 21 (2021)."},"article_number":"4933","language":[{"iso":"eng"}],"year":"2021","_id":"4803","volume":21,"title":"F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes","date_created":"2024-07-10T14:44:51Z","publication_status":"published","publication":"Sensors","issue":"14","user_id":"220548","alternative_id":["4810"],"type":"journal_article","publication_identifier":{"eissn":["1424-8220"]},"tmp":{"short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png"}},{"intvolume":"         5","doi":"10.4018/ijaras.2014070102","publisher":"IGI Global","page":"20-39","date_updated":"2026-03-17T15:29:06Z","author":[{"first_name":"Muddesar","full_name":"Iqbal, Muddesar","last_name":"Iqbal"},{"first_name":"Muhammad","last_name":"Shafiq","full_name":"Shafiq, Muhammad"},{"last_name":"Choi","full_name":"Choi, Jin-Ghoo","first_name":"Jin-Ghoo"},{"orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-6902-6116/work/163869223","id":"254998","first_name":"Hasina","full_name":"Attaullah, Hasina","orcid":"0000-0002-6902-6116","last_name":"Attaullah"},{"full_name":"Akram, Khawar","last_name":"Akram","first_name":"Khawar"},{"full_name":"Wang, Xingheng","last_name":"Wang","first_name":"Xingheng"}],"citation":{"ama":"Iqbal M, Shafiq M, Choi J-G, Attaullah H, Akram K, Wang X. Design and Analysis of a Novel Hybrid Wireless Mesh Network Routing Protocol. <i>International Journal of Adaptive, Resilient and Autonomic Systems</i>. 2014;5(3):20-39. doi:<a href=\"https://doi.org/10.4018/ijaras.2014070102\">10.4018/ijaras.2014070102</a>","mla":"Iqbal, Muddesar, et al. “Design and Analysis of a Novel Hybrid Wireless Mesh Network Routing Protocol.” <i>International Journal of Adaptive, Resilient and Autonomic Systems</i>, vol. 5, no. 3, IGI Global, 2014, pp. 20–39, doi:<a href=\"https://doi.org/10.4018/ijaras.2014070102\">10.4018/ijaras.2014070102</a>.","short":"M. Iqbal, M. Shafiq, J.-G. Choi, H. Attaullah, K. Akram, X. Wang, International Journal of Adaptive, Resilient and Autonomic Systems 5 (2014) 20–39.","chicago":"Iqbal, Muddesar, Muhammad Shafiq, Jin-Ghoo Choi, Hasina Attaullah, Khawar Akram, and Xingheng Wang. “Design and Analysis of a Novel Hybrid Wireless Mesh Network Routing Protocol.” <i>International Journal of Adaptive, Resilient and Autonomic Systems</i> 5, no. 3 (2014): 20–39. <a href=\"https://doi.org/10.4018/ijaras.2014070102\">https://doi.org/10.4018/ijaras.2014070102</a>.","bibtex":"@article{Iqbal_Shafiq_Choi_Attaullah_Akram_Wang_2014, title={Design and Analysis of a Novel Hybrid Wireless Mesh Network Routing Protocol}, volume={5}, DOI={<a href=\"https://doi.org/10.4018/ijaras.2014070102\">10.4018/ijaras.2014070102</a>}, number={3}, journal={International Journal of Adaptive, Resilient and Autonomic Systems}, publisher={IGI Global}, author={Iqbal, Muddesar and Shafiq, Muhammad and Choi, Jin-Ghoo and Attaullah, Hasina and Akram, Khawar and Wang, Xingheng}, year={2014}, pages={20–39} }","apa":"Iqbal, M., Shafiq, M., Choi, J.-G., Attaullah, H., Akram, K., &#38; Wang, X. (2014). Design and Analysis of a Novel Hybrid Wireless Mesh Network Routing Protocol. <i>International Journal of Adaptive, Resilient and Autonomic Systems</i>, <i>5</i>(3), 20–39. <a href=\"https://doi.org/10.4018/ijaras.2014070102\">https://doi.org/10.4018/ijaras.2014070102</a>","alphadin":"<span style=\"font-variant:small-caps;\">Iqbal, Muddesar</span> ; <span style=\"font-variant:small-caps;\">Shafiq, Muhammad</span> ; <span style=\"font-variant:small-caps;\">Choi, Jin-Ghoo</span> ; <span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Akram, Khawar</span> ; <span style=\"font-variant:small-caps;\">Wang, Xingheng</span>: Design and Analysis of a Novel Hybrid Wireless Mesh Network Routing Protocol. In: <i>International Journal of Adaptive, Resilient and Autonomic Systems</i> Bd. 5, IGI Global (2014), Nr. 3, S. 20–39","ieee":"M. Iqbal, M. Shafiq, J.-G. Choi, H. Attaullah, K. Akram, and X. Wang, “Design and Analysis of a Novel Hybrid Wireless Mesh Network Routing Protocol,” <i>International Journal of Adaptive, Resilient and Autonomic Systems</i>, vol. 5, no. 3, pp. 20–39, 2014."},"status":"public","year":"2014","_id":"4804","language":[{"iso":"eng"}],"title":"Design and Analysis of a Novel Hybrid Wireless Mesh Network Routing Protocol","date_created":"2024-07-10T14:44:52Z","volume":5,"issue":"3","publication_status":"published","publication":"International Journal of Adaptive, Resilient and Autonomic Systems","publication_identifier":{"eissn":["1947-9239"],"issn":["1947-9220"]},"type":"journal_article","user_id":"220548"},{"citation":{"ieee":"H. Attaullah and M. Y. Javed, “QoS based Vertical handover between UMTS, WiFi and WiMAX Networks,” <i>Journal of Convergence Information Technology</i>, vol. 4, no. 3, pp. 59–64, 2009.","alphadin":"<span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Javed, Muhammad Younus </span>: QoS based Vertical handover between UMTS, WiFi and WiMAX Networks. In: <i>Journal of Convergence Information Technology</i> Bd. 4, AICIT (2009), Nr. 3, S. 59–64","bibtex":"@article{Attaullah_Javed_2009, title={QoS based Vertical handover between UMTS, WiFi and WiMAX Networks}, volume={4}, DOI={<a href=\"https://doi.org/10.4156/jcit.vol4.issue3.8\">10.4156/jcit.vol4.issue3.8</a>}, number={3}, journal={Journal of Convergence Information Technology}, publisher={AICIT}, author={Attaullah, Hasina and Javed, Muhammad Younus }, year={2009}, pages={59–64} }","apa":"Attaullah, H., &#38; Javed, M. Y. (2009). QoS based Vertical handover between UMTS, WiFi and WiMAX Networks. <i>Journal of Convergence Information Technology</i>, <i>4</i>(3), 59–64. <a href=\"https://doi.org/10.4156/jcit.vol4.issue3.8\">https://doi.org/10.4156/jcit.vol4.issue3.8</a>","short":"H. Attaullah, M.Y. Javed, Journal of Convergence Information Technology 4 (2009) 59–64.","chicago":"Attaullah, Hasina, and Muhammad Younus  Javed. “QoS Based Vertical Handover between UMTS, WiFi and WiMAX Networks.” <i>Journal of Convergence Information Technology</i> 4, no. 3 (2009): 59–64. <a href=\"https://doi.org/10.4156/jcit.vol4.issue3.8\">https://doi.org/10.4156/jcit.vol4.issue3.8</a>.","mla":"Attaullah, Hasina, and Muhammad Younus Javed. “QoS Based Vertical Handover between UMTS, WiFi and WiMAX Networks.” <i>Journal of Convergence Information Technology</i>, vol. 4, no. 3, AICIT, 2009, pp. 59–64, doi:<a href=\"https://doi.org/10.4156/jcit.vol4.issue3.8\">10.4156/jcit.vol4.issue3.8</a>.","ama":"Attaullah H, Javed MY. QoS based Vertical handover between UMTS, WiFi and WiMAX Networks. <i>Journal of Convergence Information Technology</i>. 2009;4(3):59-64. doi:<a href=\"https://doi.org/10.4156/jcit.vol4.issue3.8\">10.4156/jcit.vol4.issue3.8</a>"},"author":[{"orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-6902-6116/work/163869434","id":"254998","first_name":"Hasina","full_name":"Attaullah, Hasina","orcid":"0000-0002-6902-6116","last_name":"Attaullah"},{"first_name":"Muhammad Younus ","full_name":"Javed, Muhammad Younus ","last_name":"Javed"}],"status":"public","intvolume":"         4","doi":"10.4156/jcit.vol4.issue3.8","publisher":"AICIT","page":"59-64","date_updated":"2026-03-17T15:29:06Z","year":"2009","_id":"4805","language":[{"iso":"eng"}],"title":"QoS based Vertical handover between UMTS, WiFi and WiMAX Networks","date_created":"2024-07-10T14:44:53Z","volume":4,"type":"journal_article","publication_identifier":{"eissn":["2233-9299"],"issn":["1975-9320"]},"user_id":"220548","publication_status":"published","issue":"3","publication":"Journal of Convergence Information Technology"},{"date_created":"2024-07-10T14:44:54Z","title":"Intelligent vertical handover decision model to improve QoS","user_id":"220548","type":"conference","publication_identifier":{"isbn":["978-1-4244-2916-5"]},"publication":"2008 Third International Conference on Digital Information Management","publication_status":"published","status":"public","conference":{"location":"London, United Kingdom","name":"2008 Third International Conference on Digital Information Management (ICDIM)","end_date":"2008-11-16","start_date":"2008-11-13"},"author":[{"full_name":"Attaullah, Hasina","orcid":"0000-0002-6902-6116","last_name":"Attaullah","id":"254998","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-6902-6116/work/163871193","first_name":"Hasina"},{"first_name":"Faiza","full_name":"Iqbal, Faiza","last_name":"Iqbal"},{"full_name":"Javed, Muhammad Younus","last_name":"Javed","first_name":"Muhammad Younus"}],"citation":{"apa":"Attaullah, H., Iqbal, F., &#38; Javed, M. Y. (2008). Intelligent vertical handover decision model to improve QoS. In A. Abraham (Ed.), <i>2008 Third International Conference on Digital Information Management</i> (pp. 119–124). London, United Kingdom: IEEE. <a href=\"https://doi.org/10.1109/ICDIM.2008.4746775\">https://doi.org/10.1109/ICDIM.2008.4746775</a>","bibtex":"@inproceedings{Attaullah_Iqbal_Javed_2008, title={Intelligent vertical handover decision model to improve QoS}, DOI={<a href=\"https://doi.org/10.1109/ICDIM.2008.4746775\">10.1109/ICDIM.2008.4746775</a>}, booktitle={2008 Third International Conference on Digital Information Management}, publisher={IEEE}, author={Attaullah, Hasina and Iqbal, Faiza and Javed, Muhammad Younus}, editor={Abraham, A.Editor}, year={2008}, pages={119–124} }","alphadin":"<span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Iqbal, Faiza</span> ; <span style=\"font-variant:small-caps;\">Javed, Muhammad Younus</span>: Intelligent vertical handover decision model to improve QoS. In: <span style=\"font-variant:small-caps;\">Abraham, A.</span> (Hrsg.): <i>2008 Third International Conference on Digital Information Management</i> : IEEE, 2008, S. 119–124","ieee":"H. Attaullah, F. Iqbal, and M. Y. Javed, “Intelligent vertical handover decision model to improve QoS,” in <i>2008 Third International Conference on Digital Information Management</i>, London, United Kingdom, 2008, pp. 119–124.","ama":"Attaullah H, Iqbal F, Javed MY. Intelligent vertical handover decision model to improve QoS. In: Abraham A, ed. <i>2008 Third International Conference on Digital Information Management</i>. IEEE; 2008:119-124. doi:<a href=\"https://doi.org/10.1109/ICDIM.2008.4746775\">10.1109/ICDIM.2008.4746775</a>","mla":"Attaullah, Hasina, et al. “Intelligent Vertical Handover Decision Model to Improve QoS.” <i>2008 Third International Conference on Digital Information Management</i>, edited by A. Abraham, IEEE, 2008, pp. 119–24, doi:<a href=\"https://doi.org/10.1109/ICDIM.2008.4746775\">10.1109/ICDIM.2008.4746775</a>.","chicago":"Attaullah, Hasina, Faiza Iqbal, and Muhammad Younus Javed. “Intelligent Vertical Handover Decision Model to Improve QoS.” In <i>2008 Third International Conference on Digital Information Management</i>, edited by A. Abraham, 119–24. IEEE, 2008. <a href=\"https://doi.org/10.1109/ICDIM.2008.4746775\">https://doi.org/10.1109/ICDIM.2008.4746775</a>.","short":"H. Attaullah, F. Iqbal, M.Y. Javed, in: A. Abraham (Ed.), 2008 Third International Conference on Digital Information Management, IEEE, 2008, pp. 119–124."},"date_updated":"2026-03-17T15:29:06Z","publisher":"IEEE","page":"119-124","doi":"10.1109/ICDIM.2008.4746775","language":[{"iso":"eng"}],"_id":"4806","editor":[{"first_name":"A.","last_name":"Abraham","full_name":"Abraham, A."}],"year":"2008"}]
