Остановите войну!
for scientists:
default search action
Javed Ali Khan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Arun Asif, Faheem Ahmed, Zeeshan, Javed Ali Khan, Eman Allogmani, Nora El Rashidy, Sobia Manzoor, Muhammad Shahid Anwar:
Machine Learning Based Diagnostic Paradigm in Viral and Non-Viral Hepatocellular Carcinoma. IEEE Access 12: 37557-37571 (2024) - [j20]Muhammad Azeem Akbar, Arif Ali Khan, Sami Hyrynsalmi, Javed Ali Khan:
6G secure quantum communication: a success probability prediction model. Autom. Softw. Eng. 31(1): 31 (2024) - [j19]Arif Ali Khan, Javed Ali Khan, Muhammad Azeem Akbar, Peng Zhou, Mahdi Fahmideh:
Insights into software development approaches: mining Q &A repositories. Empir. Softw. Eng. 29(1): 8 (2024) - [j18]Naeem Ullah, Muhammad Hassan, Javed Ali Khan, Muhammad Shahid Anwar, Khursheed Aurangzeb:
Enhancing explainability in brain tumor detection: A novel DeepEBTDNet model with LIME on MRI images. Int. J. Imaging Syst. Technol. 34(1) (2024) - 2023
- [j17]Zohaib Ahmad Khan, Yuanqing Xia, Shahzad Ali, Javed Ali Khan, Sameh S. Askar, Mohamed Abouhawwash, Nora El-Rashidy:
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evolution Model Based on Distributed Representations. IEEE Access 11: 98787-98804 (2023) - [j16]Hasna Arshad, Saima Shaheen, Javed Ali Khan, Muhammad Shahid Anwar, Khursheed Aurangzeb, Musaed A. Alhussein:
A novel hybrid requirement's prioritization approach based on critical software project factors. Cogn. Technol. Work. 25(2-3): 305-324 (2023) - [j15]Affan Yasin, Sheikh Badar ud din Tahir, Jaroslav Frnda, Rubia Fatima, Javed Ali Khan, Muhammad Shahid Anwar:
Anomaly Prediction over Human Crowded Scenes via Associate-Based Data Mining and K-Ary Tree Hashing. Int. J. Intell. Syst. 2023: 1-12 (2023) - [i2]Arif Ali Khan, Javed Ali Khan, Muhammad Azeem Akbar, Peng Zhou, Mahdi Fahmideh:
Insights into Software Development Approaches: Mining Q&A Repositories. CoRR abs/2305.01315 (2023) - 2022
- [j14]Fahim Muhammad Khan, Javed Ali Khan, Muhammad Assam, Ahmed S. Almasoud, Abdelzahir Abdelmaboud, Manar Ahmed Mohammed Hamza:
A Comparative Systematic Analysis of Stakeholder's Identification Methods in Requirements Elicitation. IEEE Access 10: 30982-31011 (2022) - [j13]Naeem Ullah, Javed Ali Khan, Lubna Alharbi, Asaf Raza, Wahab Khan, Ijaz Ahmad:
An Efficient Approach for Crops Pests Recognition and Classification Based on Novel DeepPestNet Deep Learning Model. IEEE Access 10: 73019-73032 (2022) - [j12]M. Irfan Marwat, Javed Ali Khan, Mohammad Dahman Alshehri, Muhammad Asghar Ali, Hizbullah, Haider Ali, Muhammad Assam:
Sentiment Analysis of Product Reviews to Identify Deceptive Rating Information in Social Media: A SentiDeceptive Approach. KSII Trans. Internet Inf. Syst. 16(3): 830-860 (2022) - [j11]Abdul Jabbar, Xi Li, Muhammad Assam, Javed Ali Khan, Marwa Ismael Obayya, Mimouna Abdullah Alkhonaini, Fahd N. Al-Wesabi, Muhammad Assad:
AFD-StackGAN: Automatic Mask Generation Network for Face De-Occlusion Using StackGAN. Sensors 22(5): 1747 (2022) - [j10]Sheikh Badar ud din Tahir, Abdul Basit Dogar, Rubia Fatima, Affan Yasin, Muhammad Shafiq, Javed Ali Khan, Muhammad Assam, Abdullah Mohamed, El-Awady Attia:
Stochastic Recognition of Human Physical Activities via Augmented Feature Descriptors and Random Forest Model. Sensors 22(17): 6632 (2022) - [j9]Naeem Ullah, Muhammad Sohail Khan, Javed Ali Khan, Ahyoung Choi, Muhammad Shahid Anwar:
A Robust End-to-End Deep Learning-Based Approach for Effective and Reliable BTD Using MR Images. Sensors 22(19): 7575 (2022) - [j8]Affan Yasin, Rubia Fatima, Lin Liu, Javed Ali Khan, Raian Ali, Jianmin Wang:
On the utilization of non-quality assessed literature in software engineering research. J. Softw. Evol. Process. 34(7) (2022) - [j7]Javed Ali Khan, Affan Yasin, Rubia Fatima, Danish Vasan, Arif Ali Khan, Abdul Wahid Khan:
Valuating requirements arguments in the online user's forum for requirements decision-making: The CrowdRE-VArg framework. Softw. Pract. Exp. 52(12): 2537-2573 (2022) - 2021
- [j6]Abudul Wahid Khan, Maseeh Ullah Khan, Javed Ali Khan, Arshad Ahmad, Khalil Khan, Muhammad Zamir, Wonjoon Kim, Muhammad Fazal Ijaz:
Analyzing and Evaluating Critical Challenges and Practices for Software Vendor Organizations to Secure Big Data on Cloud Computing: An AHP-Based Systematic Approach. IEEE Access 9: 107309-107332 (2021) - [j5]Abdul Wahid Khan, Maseeh Ullah Khan, Javed Ali Khan, Javed Khan, Wresham Gul:
Identification and prioritization of security challenges of big data on cloud computing based on SLR: A fuzzy-TOPSIS analysis approach. J. Softw. Evol. Process. 33(12) (2021) - [c5]Oliver Karras, Eduard C. Groen, Javed Ali Khan, Sören Auer:
Researcher or Crowd Member? Why not both! The Open Research Knowledge Graph for Applying and Communicating CrowdRE Research. RE Workshops 2021: 320-327 - [i1]Oliver Karras, Eduard C. Groen, Javed Ali Khan, Sören Auer:
Researcher or Crowd Member? Why not both! The Open Research Knowledge Graph for Applying and Communicating CrowdRE Research. CoRR abs/2108.05085 (2021) - 2020
- [j4]Javed Ali Khan, Lin Liu, Lijie Wen:
Requirements knowledge acquisition from online user forums. IET Softw. 14(3): 242-253 (2020) - [j3]Javed Ali Khan, Lin Liu, Lijie Wen, Raian Ali:
Conceptualising, extracting and analysing requirements arguments in users' forums: The CrowdRE-Arg framework. J. Softw. Evol. Process. 32(12) (2020)
2010 – 2019
- 2019
- [j2]Liaqat Ali, Atiqur Rahman, Aurangzeb Khan, Mingyi Zhou, Ashir Javeed, Javed Ali Khan:
An Automated Diagnostic System for Heart Disease Prediction Based on χ2 Statistical Model and Optimally Configured Deep Neural Network. IEEE Access 7: 34938-34945 (2019) - [j1]Liaqat Ali, Awais Niamat, Javed Ali Khan, Noorbakhsh Amiri Golilarz, Xiong Xingzhong, Adeeb Noor, Redhwan Nour, Syed Ahmad Chan Bukhari:
An Optimized Stacked Support Vector Machines Based Expert System for the Effective Prediction of Heart Failure. IEEE Access 7: 54007-54014 (2019) - [c4]Javed Ali Khan, Yuchen Xie, Lin Liu, Lijie Wen:
Analysis of Requirements-Related Arguments in User Forums. RE 2019: 63-74 - [c3]Javed Ali Khan:
Mining Requirements Arguments from user Forums. RE 2019: 440-445 - [c2]Javed Ali Khan, Lin Liu, Lijie Wen, Raian Ali:
Crowd Intelligence in Requirements Engineering: Current Status and Future Directions. REFSQ 2019: 245-261 - 2018
- [c1]Javed Ali Khan, Lin Liu, Yidi Jia, Lijie Wen:
Linguistic Analysis of Crowd Requirements: An Experimental Study. EmpiRE@RE 2018: 24-31
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint