![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 120 matches
- 2024
- Shahzad Ali
, Yuanqing Xia
, Zohaib Ahmad Khan
, Abid Ali
, Qamar Navid, Khursheed Aurangzeb
, Muhammad Shahid Anwar
:
Frequency Regulation in Interconnected Power System Through Enhanced Beluga Whale Optimized Flatness-Based Active Disturbance Rejection Control. IEEE Access 12: 15348-15367 (2024) - Muhammad Ramzan
, Adnan Abid
, Muhammad Bilal
, Khalid Mahmood Aamir, Sufyan Ali Memon
, Tae-Sun Chung:
Effectiveness of Pre-Trained CNN Networks for Detecting Abnormal Activities in Online Exams. IEEE Access 12: 21503-21519 (2024) - Muhammad Zeeshan, Madad Khan
, Muhammad Ali Abid, Zubair Ahmad, Saima Anis:
Decision-making method under the interval-valued complex fuzzy soft environment. Comput. Appl. Math. 43(4): 203 (2024) - Abid Jamal, Muhammad Umar Javed, Nabil Ali Alrajeh, Safdar Hussain Bouk, Nadeem Javaid:
Blockchain based reputation management, data storage and distributed revocation in vehicular energy networks in smart health care systems. Clust. Comput. 27(2): 2151-2163 (2024) - Abid Mahboob, Zafar Ullah, Ali Ovais, Muhammad Waheed Rasheed, S. A. Edalatpanah
, Kainat Yasin:
A MAGDM approach for evaluating the impact of artificial intelligence on education using 2-tuple linguistic q-rung orthopair fuzzy sets and Schweizer-Sklar weighted power average operator. Frontiers Artif. Intell. 7 (2024) - Muhammad Waheed Rasheed, Abid Mahboob, Anfal Nabeel Mustafa, Israa Badi, Zainab Abdulkhaleq Ahmed Ali, Zainb H. Feza:
Enhancing breast cancer treatment selection through 2TLIVq-ROFS-based multi-attribute group decision making. Frontiers Artif. Intell. 7 (2024) - Syeda Iqra Hassan, Sidra Abid Syed, Syed Waqad Ali, Hira Zahid, Samia Tariq, Mazliham Mohd Su'ud, Muhammad Mansoor Alam:
Systematic literature review on the application of machine learning for the prediction of properties of different types of concrete. PeerJ Comput. Sci. 10: e1853 (2024) - Muhammad Ehtisham, Mahmood ul Hassan
, Amin A. Al-Awady, Abid Ali
, Muhammad Junaid
, Jahangir Khan, Yahya Ali Abdelrahman Ali
, Muhammad Akram
:
Internet of Vehicles (IoV)-Based Task Scheduling Approach Using Fuzzy Logic Technique in Fog Computing Enables Vehicular Ad Hoc Network (VANET). Sensors 24(3): 874 (2024) - Mahmood Ul Hassan
, Amin A. Al-Awady, Abid Ali
, Muhammad Munwar Iqbal
, Muhammad Akram
, Harun Jamil:
Smart Resource Allocation in Mobile Cloud Next-Generation Network (NGN) Orchestration with Context-Aware Data and Machine Learning for the Cost Optimization of Microservice Applications. Sensors 24(3): 865 (2024) - Mahmood ul Hassan
, Amin A. Al-Awady, Abid Ali
, Sifatullah, Muhammad Akram
, Muhammad Munwar Iqbal
, Jahangir Khan, Yahya Ali Abdelrahman Ali
:
ANN-Based Intelligent Secure Routing Protocol in Vehicular Ad Hoc Networks (VANETs) Using Enhanced AODV. Sensors 24(3): 818 (2024) - Muhammad Ali Farooq, Syed Muhammad Fasih Ul Hassan, Muhammad Umer Farooq, Abid Rafique:
High Throughput Neural Network for Network Intrusion Detection on FPGAs: An Algorithm-Architecture Interaction. ICISSP 2024: 423-429 - Syed Muhammad Aamir, Hongbin Ma, Malak Abid Ali Khan
, Muhammad Aaqib:
Real-Time Object Detection in Occluded Environment with Background Cluttering Effects Using Deep Learning. CoRR abs/2401.00986 (2024) - 2023
- Habib Akbar, Muhammad Munwar Iqbal
, Abid Ali
, Amna Parveen
, Nagwan M. Abdel Samee
, Manal Abdullah Alohali
, Mohammed Saleh Ali Muthanna
:
Detecting Rotational Symmetry in Polar Domain Based on SIFT. IEEE Access 11: 68643-68652 (2023) - Munir Ali, Afshan Khaliq, Muhammad Abid Anwar, Jianhang Lv
, Muhammad Malik
, Tian Feng, Srikrishna Chanakya Bodepudi
, Hongwei Guo
, Khurram Shehzad, Zongwen Li, Yunfan Dong
, Wei Liu
, Huan Hu
, Yuda Zhao, Bin Yu, Yang Xu
:
Graphene Channel Electron-Multiplying Charge-Coupled Pixel. IEEE Access 11: 37424-37436 (2023) - Kazim Ali, Adnan N. Qureshi, Muhammad Shahid Bhatti, Abid Sohail, Muhammad Hijji, Atif Saeed:
De-Noising Brain MRI Images by Mixing Concatenation and Residual Learning (MCR). Comput. Syst. Sci. Eng. 45(2): 1167-1186 (2023) - Syahirul Alim Ritonga, Herianto
, Abid Muzhaffar, Benawa Muhammad Adib:
Analysis of design parameters' effect on 3D printed soft pneumatic actuator generated curvature and tip force. Int. J. Intell. Robotics Appl. 7(4): 752-762 (2023) - Asif Hussian
, Abdul Mateen, Farhan Amin
, Muhammad Ali Abid, Saeed Ullah:
Health Monitoring Apps: An Evaluation of the Persuasive System Design Model for Human Wellbeing. Inf. 14(7): 412 (2023) - Abid Ali Minhas
, Sohail Jabbar
, Muhammad Farhan
, Muhammad Najam-ul-Islam
:
Smart methodology for safe life on roads with active drivers based on real-time risk and behavioral monitoring. J. Ambient Intell. Humaniz. Comput. 14(11): 15361-15373 (2023) - Aamir Wali
, Aliza Lisan, Hammad Ather
, Muhammad Qasim, Muhammad Uzair Abid:
Application in multimedia: from camera to VR. Multim. Tools Appl. 82(8): 11721-11751 (2023) - Mahmood ul Hassan
, Amin A. Al-Awady, Abid Ali
, Muhammad Munawar Iqbal, Muhammad Akram, Jahangir Khan, Ali Ahmad AbuOdeh:
An efficient dynamic decision-based task optimization and scheduling approach for microservice-based cost management in mobile cloud computing applications. Pervasive Mob. Comput. 92: 101785 (2023) - Hamad Ali Abosaq
, Muhammad Ramzan
, Faisal AlThobiani, Adnan Abid, Khalid Mahmood Aamir, Hesham Abdushkour, Muhammad Irfan, Mohammad E. Gommosani
, Saleh Mohammed Ghonaim, V. R. Shamji, Saifur Rahman
:
Unusual Driver Behavior Detection in Videos Using Deep Learning Models. Sensors 23(1): 311 (2023) - Muhammad Abid Ali, Abdul Rauf Bhatti
, Akhtar Rasool
, Muhammad Farhan
, Ebenezer Esenogho
:
Optimal Location and Sizing of Photovoltaic-Based Distributed Generations to Improve the Efficiency and Symmetry of a Distribution Network by Handling Random Constraints of Particle Swarm Optimization Algorithm. Symmetry 15(9): 1752 (2023) - Syed Waqad Ali
, Muhammad Asif
, Muhammad Yousuf Irfan Zia
, Munaf Rashid
, Sidra Abid Syed, Enrique Nava:
CDSS for Early Recognition of Respiratory Diseases based on AI Techniques: A Systematic Review. Wirel. Pers. Commun. 131(2): 739-761 (2023) - Abid Ali Fareedi, Muhammad Ismail, Ahmad Ghazawneh, Magnus Bergquist, Fernando Ortiz-Rodríguez:
The Utilization of Artificial Intelligence for Developing Autonomous Social Robots within Health Information Systems. TEXT2KG/BiKE@ESWC 2023: 34-50 - Haris Anjum, Usama Arshad, Raja Hashim Ali, Zain Ul Abideen, Muhammad Huzaifa Shah, Talha Ali Khan, Ali Zeeshan Ijaz, Abu Bakar Siddique, Muhammad Imad:
Robust and Reliable Liveness Detection Models for Facial Recognition Systems. FIT 2023: 292-297 - Hassan Ashfaq, Usama Arshad, Raja Hashim Ali, Zain Ul Abideen, Muhammad Huzaifa Shah, Talha Ali Khan, Ali Zeeshan Ijaz, Nisar Ali, Abu Bakar Siddique:
Mitigating Crop Losses: AI-enabled Disease Detection in Tomato Plants. FIT 2023: 190-195 - Danyaal Mahmood, Usama Arshad, Raja Hashim Ali, Zain Ul Abideen, Muhammad Huzaifa Shah, Talha Ali Khan, Ali Zeeshan Ijaz, Nisar Ali, Abu Bakar Siddique:
Exploiting Partial Observability and Optimized Simple State Representations in Deep Q-Learning. FIT 2023: 25-30 - Muhammad Naeem, Abu Bakar Siddique, Raja Hashim Ali, Usama Arshad, Zain Ul Abideen, Talha Ali Khan, Muhammad Huzaifa Shah, Ali Zeeshan Ijaz, Nisar Ali:
Performance Evaluation of Popular Deep Neural Networks for Neural Machine Translation. FIT 2023: 220-225 - Abdul Wahab Paracha, Usama Arshad, Raja Hashim Ali, Zain Ul Abideen, Muhammad Huzaifa Shah, Talha Ali Khan, Ali Zeeshan Ijaz, Nisar Ali, Abu Bakar Siddique:
Leveraging AI and NLP in Chatbot Development: An Experimental Study. FIT 2023: 172-177 - Quswar Abid, Ghulam Abbas, Zaiwar Ali, Ziaul Haq Abbas
, Shanshan Tu, Youssef Harrath, Muhammad Waqas:
Distance Vector and Prominent Reliable Path Selection based Stochastic Routing in Distributed Internet of Things. IWCMC 2023: 935-940
skipping 90 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-16 06:12 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint