default search action
Aimal Khan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Aimal Khan, Alexander Hetznecker, Rainer Drath, Thomas Greiner:
Enhanced Symbolic Artificial Intelligence Mechanism for External Magnetic Interference Classification in Magnetostrictive Position Sensors. ICIT 2024: 1-6 - 2023
- [c19]Aimal Khan, Tobias König, Florian Liebgott, Thomas Greiner:
Self-Monitoring of External Magnetic Interference in Magnetostrictive Position Sensors Using Machine Learning. ICMLT 2023: 8-14 - [c18]Aimal Khan, Tobias König, Florian Liebgott, Thomas Greiner:
External Magnetic Interference Classification in Magnetostrictive Position Sensors using Neuro-Symbolic AI with Log-Likelihood Ratios. INDIN 2023: 1-6 - 2022
- [j10]Ayesha Sadiq, Sajid Gul Khawaja, Muhammad Usman Akram, Norah Saleh Alghamdi, Aimal Khan, Arsalan Shaukat:
Machine Learning and Signal Processing Based Analysis of sEMG Signals for Daily Action Classification. IEEE Access 10: 40506-40516 (2022) - 2021
- [j9]Tahira Iqbal, Arslan Shaukat, Muhammad Usman Akram, Zartasha Mustansar, Aimal Khan:
Automatic Diagnosis of Pneumothorax From Chest Radiographs: A Systematic Literature Review. IEEE Access 9: 145817-145839 (2021) - 2020
- [j8]Bushra Rashid, Ayaz Ahmad, Sajid Saleem, Aimal Khan:
Joint energy efficient power and subchannel allocation for uplink MC-NOMA networks. Int. J. Commun. Syst. 33(17) (2020) - [c17]Babar Zeb, Aimal Khan, Younas Khan, Muhammad Faisal Masood, Iqra Tahir, Muhammad Asad:
Towards the Selection of the Best Machine Learning Techniques and Methods for Urinalysis. ICMLC 2020: 127-133
2010 – 2019
- 2019
- [j7]Sher Ali, Ayaz Ahmad, Aimal Khan:
Energy-efficient resource allocation and RRH association in multitier 5G H-CRANs. Trans. Emerg. Telecommun. Technol. 30(1) (2019) - [j6]Farhan Hussain, Mian Ilyas Ahmad, Sajid Anwar, Aimal Khan, Pyoung Won Kim:
Efficient motion estimation using two-bit transform and modified multilevel successive elimination. J. Ambient Intell. Humaniz. Comput. 10(10): 3947-3953 (2019) - [j5]Faheem Ud Din, Ayaz Ahmad, Hameed Ullah, Aimal Khan, Tariq Umer, Shaohua Wan:
Efficient sizing and placement of distributed generators in cyber-physical power systems. J. Syst. Archit. 97: 197-207 (2019) - [c16]Younas Khan, Usman Qamar, Nazish Yousaf, Aimal Khan:
Machine Learning Techniques for Heart Disease Datasets: A Survey. ICMLC 2019: 27-35 - [c15]Muhammad Asad, Usman Qamar, Babar Zeb, Aimal Khan, Younas Khan:
Blood Glucose Level Prediction with Minimal Inputs Using Feedforward Neural Network for Diabetic Type 1 Patients. ICMLC 2019: 182-185 - [c14]Muhammad Asad, Usman Qamar, Aimal Khan, Rahmat Ullah Safdar:
A Systematic Literature Review of Continuous Blood Glucose Monitoring and Suggesting the Quantity of Insulin or Artificial Pancreas (AP) for Diabetic Type 1 Patients. ICMLC 2019: 539-545 - [c13]Muhammad Sufian, Aimal Khan, Takreem Saeed, Zirak Khan:
Denoising The Wireless Channel Corrupted Images Using Machine Learning. SNPD 2019: 173-178 - 2018
- [j4]Nashid Shahriar, Shihabur Rahman Chowdhury, Reaz Ahmed, Aimal Khan, Siavash Fathi, Raouf Boutaba, Jeebak Mitra, Liu Liu:
Virtual Network Survivability Through Joint Spare Capacity Allocation and Embedding. IEEE J. Sel. Areas Commun. 36(3): 502-518 (2018) - [j3]Aimal Khan, Saad Rehman, Muhammad Abbas, Ayaz Ahmad:
On the mutual information of relaying protocols. Phys. Commun. 30: 33-42 (2018) - 2017
- [j2]Nashid Shahriar, Reaz Ahmed, Shihabur Rahman Chowdhury, Aimal Khan, Raouf Boutaba, Jeebak Mitra:
Generalized Recovery From Node Failure in Virtual Network Embedding. IEEE Trans. Netw. Serv. Manag. 14(2): 261-274 (2017) - [c12]Shihabur Rahman Chowdhury, Reaz Ahmed, Nashid Shahriar, Aimal Khan, Raouf Boutaba, Jeebak Mitra, Liu Liu:
ReViNE: Reallocation of Virtual Network Embedding to eliminate substrate bottlenecks. IM 2017: 116-124 - [c11]Nashid Shahriar, Shihabur Rahman Chowdhury, Reaz Ahmed, Aimal Khan, Raouf Boutaba, Jeebak Mitra, Liu Liu:
Joint backup capacity allocation and embedding for survivable virtual networks. Networking 2017: 1-9 - 2016
- [j1]Zhihong Liu, Aimal Khan, Peixin Chen, Yaping Liu, Zhenghu Gong:
DynamicAdjust: Dynamic Resource Adjustment for Mitigating Skew in MapReduce. IEICE Trans. Inf. Syst. 99-D(6): 1686-1689 (2016) - [c10]Nashid Shahriar, Reaz Ahmed, Aimal Khan, Shihabur Rahman Chowdhury, Raouf Boutaba, Jeebak Mitra:
ReNoVatE: Recovery from node failure in virtual network embedding. CNSM 2016: 19-27 - 2015
- [c9]Milad Ghaznavi, Aimal Khan, Nashid Shahriar, Khalid Alsubhi, Reaz Ahmed, Raouf Boutaba:
Elastic virtual network function placement. CloudNet 2015: 255-260 - 2012
- [c8]Rajesh Narayanan, Saikrishna Kotha, Geng Lin, Aimal Khan, Sajjad Rizvi, Wajeeha Javed, Hassan Khan, Syed Ali Khayam:
Macroflows and Microflows: Enabling Rapid Network Innovation through a Split SDN Data Plane. EWSDN 2012: 79-84 - [c7]Aimal Khan, Volker Kühn:
Performance comparison of different protocols for a two-hop multiple relay network. WSA 2012: 20-27 - [c6]Aimal Khan, Volker Kühn:
Analysis of power optimization in a 2-hop multiple relay network. WSA 2012: 230-237 - 2011
- [c5]Aimal Khan, Volker Kühn:
Rate optimization for incremental redundancy and repetition coding in relay networks. EUSIPCO 2011: 789-793 - 2010
- [c4]Aimal Khan, Volker Kühn:
Power Optimization in Adaptive Relay Networks. GLOBECOM 2010: 1-5 - [c3]Aimal Khan, Volker Kühn:
Power versus relay selection in adaptive relay networks. ISWCS 2010: 541-545 - [c2]Aimal Khan, Volker Kühn:
Optimizing ARQ strategies in relay networks. WiOpt 2010: 520-527 - [c1]Aimal Khan, Volker Kühn:
On the performance of adaptive relaying with ARQ. WSA 2010: 121-126
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint