default search action
Muhammad Mansoor Alam
Person information
- affiliation: Universiti Kuala Lumpur, British Malaysian Institute (BMI), Malaysia
- affiliation: Institute of Business and Management (IoBM), Karachi, Pakistan
Other persons with the same name
- Muhammad Alam — disambiguation page
- Muhammad Alam 0002 — Hangzhou Dianzi University, School of Cyberspace, China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j29]Imran, Megat F. Zuhairi, Syed Mubashir Ali, Zeeshan Shahid, Muhammad Mansoor Alam, Mazliham Mohd Su'ud:
Realtime Feature Engineering for Anomaly Detection in IoT Based MQTT Networks. IEEE Access 12: 25700-25718 (2024) - [j28]Talha Ahmed Khan, Muhammad Alam, Safdar Ali Rizvi, Zeeshan Shahid, Mohd Su'ud Mazliham:
Introducing AI applications in engineering education (PBL): An implementation of power generation at minimum wind velocity and turbine faults classification using AI. Comput. Appl. Eng. Educ. 32(1) (2024) - [j27]Saïma Sultana, Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Jawahir Che Mustapha Yusuf, Mukesh Prasad:
A Deep Dive into Robot Vision - An Integrative Systematic Literature Review Methodologies and Research Endeavor Practices. ACM Comput. Surv. 56(9): 233:1-233:33 (2024) - [j26]Syeda Iqra Hassan, Sidra Abid Syed, Syed Waqad Ali, Hira Zahid, Samia Tariq, Mazliham Mohd Su'ud, Muhammad Mansoor Alam:
Systematic literature review on the application of machine learning for the prediction of properties of different types of concrete. PeerJ Comput. Sci. 10: e1853 (2024) - 2023
- [j25]Muhammad Zubair, Muhammad Affan Alim, Imran Naseem, Muhammad Mansoor Alam, Mazliham Mohd Su'ud:
Reverse Image Search for Collage: A Novel Local Feature-Based Framework. IEEE Access 11: 78182-78191 (2023) - [j24]Mohammad Riyaz Belgaum, Shahrulniza Musa, Fuead Ali, Muhammad Mansoor Alam, Zainab Alansari, Safeeullah Soomro, Mazliham Mohd Su'ud:
Self-Socio Adaptive Reliable Particle Swarm Optimization Load Balancing in Software-Defined Networking. IEEE Access 11: 101666-101677 (2023) - [j23]Syeda Iqra Hassan, Muhammad Mansoor Alam, Usman Illahi, Mazliham Mohd Su'ud:
A new deep learning-based technique for rice pest detection using remote sensing. PeerJ Comput. Sci. 9: e1167 (2023) - [j22]Muhammad Asim Shahid, Muhammad Mansoor Alam, Mazliham Mohd Su'ud:
Achieving Reliability in Cloud Computing by a Novel Hybrid Approach. Sensors 23(4): 1965 (2023) - 2022
- [j21]Shamsa Khalid, Muhammad Anees Khan, Mohd Su'ud Mazliham, Muhammad Mansoor Alam, Nida Aman, Muhammad Tanvir Taj, Rija Zaka, Muhammad Jehangir:
Predicting Risk through Artificial Intelligence Based on Machine Learning Algorithms: A Case of Pakistani Nonfinancial Firms. Complex. 2022: 6858916:1-6858916:11 (2022) - [j20]Muhammad Zubair Asghar, Adidah Lajis, Muhammad Mansoor Alam, Mohd. Khairil Rahmat, Haidawati Md Nasir, Hussain Ahmad, Mabrook S. Al-Rakhami, Atif Alamri, Fahad R. Albogamy:
A Deep Neural Network Model for the Detection and Classification of Emotions from Textual Content. Complex. 2022: 8221121:1-8221121:12 (2022) - [j19]Ihsan Ullah Khan, Aurangzeb Khan, Wahab Khan, Mazliham Mohd Su'ud, Muhammad Mansoor Alam, Fazli Subhan, Muhammad Zubair Asghar:
A Review of Urdu Sentiment Analysis with Multilingual Perspective: A Case of Urdu and Roman Urdu Language. Comput. 11(1): 3 (2022) - [j18]Abdullah Khan, Asfandyar Khan, Muneeb Ullah, Muhammad Mansoor Alam, Javed Iqbal Bangash, Mazliham Mohd Su'ud:
A computational classification method of breast cancer images using the VGGNet model. Frontiers Comput. Neurosci. 16 (2022) - [j17]Asim Iftikhar, Shahrulniza Musa, Muhammad Mansoor Alam, Rizwan Ahmed, Mazliham Mohd Su'ud, Laiq Muhammad Khan, Syed Mubashir Ali:
Risk Classification in Global Software Development Using a Machine Learning Approach: A Result Comparison of Support Vector Machine and K-Nearest Neighbor Algorithms. J. Inf. Technol. Res. 15(1): 1-21 (2022) - [j16]Muhammad Ayoub Kamal, Muhammad Mansoor Alam, Aznida Abu Bakar Sajak, Mazliham Mohd Su'ud:
Impact of LoRA and 5G on Smart Manufacturing from Automation Perspective. J. Mobile Multimedia 18(5): 1355-1378 (2022) - [j15]Syeda Iqra Hassan, Muhammad Mansoor Alam, Muhammad Yousuf Irfan Zia, Muhammad Rashid, Usman Illahi, Mazliham Mohd Su'ud:
Rice Crop Counting Using Aerial Imagery and GIS for the Assessment of Soil Health to Increase Crop Yield. Sensors 22(21): 8567 (2022) - 2021
- [j14]Syeda Iqra Hassan, Muhammad Mansoor Alam, Usman Illahi, Mohammad A. Alghamdi, Sultan H. Almotiri, Mazliham Mohd Su'ud:
A Systematic Review on Monitoring and Advanced Control Strategies in Smart Agriculture. IEEE Access 9: 32517-32548 (2021) - [j13]Sikander Khan, Farida Khan, Qurat Ul Ain Sikander, Muhammad Mansoor Alam, Mazliham Mohd Su'ud:
Intelligent Deep Brain Stimulation Systems: A General Review. IEEE Access 9: 136929-136943 (2021) - [j12]Mobeen Nazar, Muhammad Mansoor Alam, Eiad Yafi, Mazliham Mohd Su'ud:
A Systematic Review of Human-Computer Interaction and Explainable Artificial Intelligence in Healthcare With Artificial Intelligence Techniques. IEEE Access 9: 153316-153348 (2021) - [j11]Asim Iftikhar, Muhammad Alam, Rizwan Ahmed, Shahrulniza Musa, Mazliham Mohd Su'ud:
Risk Prediction by Using Artificial Neural Network in Global Software Development. Comput. Intell. Neurosci. 2021: 2922728:1-2922728:25 (2021) - [j10]Muhammad Asim Shahid, Noman Islam, Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Shahrulniza Musa:
Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment. Comput. Sci. Rev. 40: 100398 (2021) - [j9]Muhammad Ayoub Kamal, Hafiz Wahab Raza, Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Aznida Abu Bakar Sajak:
Resource Allocation Schemes for 5G Network: A Systematic Review. Sensors 21(19): 6588 (2021) - 2020
- [j8]Talha Ahmed Khan, Muhammad Mansoor Alam, Zeeshan Shahid, Mazliham Mohd Su'ud:
Investigation of Flash Floods on Early Basis: A Factual Comprehensive Review. IEEE Access 8: 19364-19380 (2020) - [j7]Mohammad Riyaz Belgaum, Shahrulniza Musa, Muhammad Mansoor Alam, Mazliham Mohd Su'ud:
A Systematic Review of Load Balancing Techniques in Software-Defined Networking. IEEE Access 8: 98612-98636 (2020) - [j6]Muhammad Asim Shahid, Noman Islam, Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Shahrulniza Musa:
A Comprehensive Study of Load Balancing Approaches in the Cloud Computing Environment and a Novel Fault Tolerance Approach. IEEE Access 8: 130500-130526 (2020) - [j5]Talha Ahmed Khan, Muhammad Mansoor Alam, Zeeshan Shahid, Mazliham Mohd Su'ud:
Prior Recognition of Flash Floods: Concrete Optimal Neural Network Configuration Analysis for Multi-Resolution Sensing. IEEE Access 8: 210006-210022 (2020) - 2019
- [j4]Javed Iqbal, Usman Illahi, Mohamad Ismail Sulaiman, Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Mohd Najib Mohd Yasin:
Mutual Coupling Reduction Using Hybrid Technique in Wideband Circularly Polarized MIMO Antenna for WiMAX Applications. IEEE Access 7: 40951-40958 (2019) - [j3]Usman Illahi, Javed Iqbal, Mohamad Ismail Sulaiman, Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Mohd Haizal Jamaluddin:
Singly-Fed Rectangular Dielectric Resonator Antenna With a Wide Circular Polarization Bandwidth and Beamwidth for WiMAX/Satellite Applications. IEEE Access 7: 66206-66214 (2019) - [j2]Javed Iqbal, Usman Illahi, Mohamad Ismail Sulaiman, Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Mohd Najib Mohd Yasin, Mohd Haizal Jamaluddin:
Bandwidth Enhancement and Generation of CP by Using Parasitic Patch on Rectangular DRA for Wireless Applications. IEEE Access 7: 94365-94372 (2019) - [j1]Usman Illahi, Javed Iqbal, Mohamad Ismail Sulaiman, Muhammad Mansoor Alam, Mazliham Mohd Su'ud, Mohd Haizal Jamaluddin, Mohd Najib Mohd Yasin:
Design of New Circularly Polarized Wearable Dielectric Resonator Antenna for Off-Body Communication in WBAN Applications. IEEE Access 7: 150573-150582 (2019)
Conference and Workshop Papers
- 2019
- [c5]Talha Ahmed Khan, Muhammad Alam, Faraz Ahmed Shaikh, Sheroz Khan, Kushsairy Abdul Kadir, Mohd Su'ud Mazliham, Zeeshan Shahid, Muhammad Yahya:
Flash Floods Prediction using Real Time data: An Implementation of ANN-PSO with less False Alarm. I2MTC 2019: 1-6 - 2012
- [c4]Muhammad Alam, Mohd Su'ud Mazliham, Patrice Boursier, Shahrulniza Musa, Jawahir Che Mustapha Yusuf:
Terrain/clutter based location prediction by using multi-condition Bayesian decision theory. ICUIMC 2012: 110:1-110:9 - [c3]Jawahir Che Mustapha Yusuf, Patrice Boursier, Mazliham Mohd Su'ud, Muhammad Alam:
Extensive overview of an ontology-based architecture for accessing multi-format information for disaster management. CAMP 2012: 294-299 - 2011
- [c2]Muhammad Alam, Mazliham Mohd Su'ud, Patrice Boursier, Shahrulniza Musa:
Modeling Interpolated Distance Error for Clutter Based Location Estimation of Wireless Nodes. DICTAP (2) 2011: 115-130 - 2010
- [c1]Muhammad Alam, Mazliham Muhammad Suud, Patrice Boursier, Shahrulniza Musa, Jawahir Che Mustapha Yusuf:
Predicted and Corrected Location Estimation of Mobile Nodes Based on the Combination of Kalman Filter and the Bayesian Decision Theory. MOBILWARE 2010: 313-325
Informal and Other Publications
- 2019
- [i6]Mohammad Riyaz Belgaum, Shahrulniza Musa, Mazliham Mohd Su'ud, Muhammad Alam, Safeeullah Soomro, Zainab Alansari:
Secured Approach Towards Reactive Routing Protocols Using Triple Factor in Mobile Adhoc Networks. CoRR abs/1904.01826 (2019) - [i5]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam:
Cloud Service ranking using Checkpoint based Load balancing in real time scheduling of Cloud Computing. CoRR abs/1905.03093 (2019) - [i4]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Shahrulniza Musa, Muhammad Alam, Mazliham Mohd Su'ud:
Load Balancing with preemptive and non-preemptive task scheduling in Cloud Computing. CoRR abs/1905.03094 (2019) - 2018
- [i3]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam, Shahrulniza Musa, Mazliham Mohd Su'ud:
Challenges: Bridge between Cloud and IoT. CoRR abs/1803.02890 (2018) - 2017
- [i2]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam:
Treatment of Reactive Routing Protocols Using Second Chance Based On Malicious Behavior of Nodes in MANETS. CoRR abs/1708.01639 (2017) - [i1]Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam:
Ideal Node Enquiry Search Algorithm (INESH) in MANETS. CoRR abs/1710.10145 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint