default search action
Muhammad Younus Javed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j22]Mehak Arshad, Muhammad Attique Khan, Usman Tariq, Ammar Armghan, Fayadh Alenezi, Muhammad Younus Javed, Shabnam Mohamed Aslam, Seifedine Kadry:
A Computer-Aided Diagnosis System Using Deep Learning for Multiclass Skin Lesion Classification. Comput. Intell. Neurosci. 2021: 9619079:1-9619079:15 (2021) - 2020
- [j21]Muhammad Attique Khan, Tallha Akram, Muhammad Sharif, Muhammad Nazeer, Muhammad Younus Javed, Syed Rameez Naqvi:
Improved strategy for human action recognition; experiencing a cascaded design. IET Image Process. 14(5): 818-829 (2020)
2010 – 2019
- 2019
- [j20]Nousheen Akhtar, Muazzam Ali Khan, Ata Ullah, Muhammad Younus Javed:
Congestion Avoidance for Smart Devices by Caching Information in MANETS and IoT. IEEE Access 7: 71459-71471 (2019) - [j19]Habiba Arshad, Muhammad Attique Khan, Muhammad Sharif, Mussarat Yasmin, Muhammad Younus Javed:
Multi-level features fusion and selection for human gait recognition: an optimized framework of Bayesian model and binomial distribution. Int. J. Mach. Learn. Cybern. 10(12): 3601-3618 (2019) - [j18]Muhammad Attique Khan, Tallha Akram, Muhammad Sharif, Muhammad Younus Javed, Muhammad Nazeer, Mussarat Yasmin:
An implementation of optimized framework for action classification using multilayers neural network on selected fused features. Pattern Anal. Appl. 22(4): 1377-1397 (2019) - [p1]Nousheen Akhtar, Muazzam Ali Khan, Ata Ullah, Muhammad Younus Javed:
Congestion Aware and Adaptive Routing Protocols for MANETs: A Survey. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 159-169 - 2018
- [j17]Muhammad Sharif, Muhammad Attique Khan, Zahid Iqbal, Muhammad Faisal Azam, Muhammad Ikram Ullah Lali, Muhammad Younus Javed:
Detection and classification of citrus diseases in agriculture based on optimized weighted segmentation and feature selection. Comput. Electron. Agric. 150: 220-234 (2018) - [j16]Muhammad Attique Khan, Muhammad Sharif, Muhammad Younus Javed, Tallha Akram, Mussarat Yasmin, Tanzila Saba:
License number plate recognition system using entropy-based features selection approach with SVM. IET Image Process. 12(2): 200-209 (2018) - [j15]Samra Siddiqui, Muhammad Attique Khan, Khalid Bashir, Muhammad Sharif, Muhammad Faisal Azam, Muhammad Younus Javed:
Human action recognition: a construction of codebook by discriminative features selection approach. Int. J. Appl. Pattern Recognit. 5(3): 206-228 (2018) - 2017
- [j14]Muhammad Sharif, Muhammad Attique Khan, Tallha Akram, Muhammad Younus Javed, Tanzila Saba, Amjad Rehman:
A framework of human detection and action recognition based on uniform segmentation and combination of Euclidean distance and joint entropy-based features selection. EURASIP J. Image Video Process. 2017: 89 (2017) - [c26]Nousheen Akhtar, Muazzam Ali Khan, Ata Ullah, Muhammad Younus Javed:
Efficient Routing Strategy for Congestion Avoidance in MANETs. FIT 2017: 305-309 - 2016
- [j13]Sumaira Kausar, Muhammad Younus Javed, Samabia Tehsin, Muhammad Almas Anjum:
A Novel Mathematical Modeling and Parameterization for Sign Language Classification. Int. J. Pattern Recognit. Artif. Intell. 30(5): 1650009:1-1650009:21 (2016) - [j12]Humaira Farid, Sharifullah Khan, Muhammad Younus Javed:
DSont: DSpace to ontology transformation. J. Inf. Sci. 42(2): 179-199 (2016) - 2015
- [j11]Ibrar Hussain, Aasia Khanum, Abdul Qudus Abbasi, Muhammad Younus Javed:
A novel approach for software architecture recovery using particle swarm optimization. Int. Arab J. Inf. Technol. 12(1): 32-41 (2015) - [j10]Saima Shaheen, Muhammad Younus Javed, Muid Mufti, Shehzad Khalid, Aasia Khanum, Shoab Ahmad Khan, M. Usman Akram:
A Novel Compression Technique for Multi-Camera Nodes through Directional Correlation. Int. J. Distributed Sens. Networks 11: 539838:1-539838:8 (2015) - [j9]Sheeraz Akram, Muhammad Younus Javed, Ayyaz Hussain, Farhan Riaz, M. Usman Akram:
Intensity-based statistical features for classification of lungs CT scan nodules using artificial intelligence techniques. J. Exp. Theor. Artif. Intell. 27(6): 737-751 (2015) - [c25]Sheeraz Akram, Muhammad Younus Javed, Ayyaz Hussain:
Automated thresholding of lung CT scan for Artificial Neural Network based classification of nodules. ICIS 2015: 335-340 - 2014
- [j8]M. Usman Akram, Anam Tariq, Shoab Ahmad Khan, Muhammad Younus Javed:
Automated detection of exudates and macula for grading of diabetic macular edema. Comput. Methods Programs Biomed. 114(2): 141-152 (2014) - [j7]Faiza Iqbal, Muhammad Younus Javed, Anjum Naveed:
Interference Aware Multipath Routing in Wireless Mesh Network. EURASIP J. Wirel. Commun. Netw. 2014: 140 (2014) - [c24]Farhan Riaz, Ali Hassan, Muhammad Younus Javed, Miguel Tavares Coimbra:
Detecting melanoma in dermoscopy images using scale adaptive local binary patterns. EMBC 2014: 6758-6761 - [c23]Humaira Farid, Sharifullah Khan, Muhammad Younus Javed:
Transformation of DSpace Database into Ontology. ICADL 2014: 130-137 - 2013
- [j6]M. Usman Akram, Shehzad Khalid, Anam Tariq, Muhammad Younus Javed:
Detection of neovascularization in retinal images using multivariate m-Mediods based classifier. Comput. Medical Imaging Graph. 37(5-6): 346-357 (2013) - [c22]Anam Tariq, M. Usman Akram, Muhammad Younus Javed:
Computer aided diagnostic system for grading of diabetic retinopathy. CIMI 2013: 30-35 - [c21]Anam Tariq, M. Usman Akram, Muhammad Younus Javed:
Lung nodule detection in CT images using neuro fuzzy classifier. CIMI 2013: 49-53 - [c20]Humaira Farid, Sharifullah Khan, Muhammad Younus Javed:
Publishing institutional repositories metadata on the semantic web. ICDIM 2013: 79-84 - 2012
- [j5]Umar Mahmud, Muhammad Younus Javed:
Context Inference Engine (CiE): Inferring Context. Int. J. Adv. Pervasive Ubiquitous Comput. 4(3): 13-41 (2012) - [j4]Muhammad Umer Munir, Muhammad Younus Javed, Shoab Ahmad Khan:
A hierarchical k-means clustering based fingerprint quality classification. Neurocomputing 85: 62-67 (2012) - [c19]Neelofar, Muhammad Younus Javed, Hufsa Mohsin:
An Automated Approach for Software Bug Classification. CISIS 2012: 414-419 - [c18]Muhammad Usman Akram, Mahmood Akhtar, Muhammad Younus Javed:
An Automated System for the Grading of Diabetic Maculopathy in Fundus Images. ICONIP (4) 2012: 36-43 - 2011
- [c17]Sumaira Kausar, Muhammad Younus Javed:
A Survey on Sign Language Recognition. FIT 2011: 95-98 - 2010
- [c16]Yasir Fayyaz, Mehwish Nasim, Muhammad Younus Javed:
Maximal Weight Topology Discovery in Ad hoc Wireless Sensor Networks. CIT 2010: 715-722 - [c15]Muhammad Younus Javed, Syed Maajid Mohsin, Muhammad Almas Anjum:
Feature based sliding window technique for face recognition. ICDIP 2010: 754619
2000 – 2009
- 2009
- [j3]Aasia Khanum, Muid Mufti, Muhammad Younus Javed, M. Zubair Shafiq:
Fuzzy case-based reasoning for facial expression recognition. Fuzzy Sets Syst. 160(2): 231-250 (2009) - [j2]Hasina Attaullah, Muhammad Younus Javed:
QoS based Vertical handover between UMTS, WiFi and WiMAX Networks. J. Convergence Inf. Technol. 4(3): 59-64 (2009) - [j1]Nazir A. Malik, Muhammad Younus Javed, Umar Mahmud:
Estimating User Preferences by Managing Contextual History in Context Aware Systems. J. Softw. 4(6): 571-576 (2009) - [c14]M. Usman Akram, Sarwat Nasir, Muhammad Almas Anjum, Muhammad Younus Javed:
Background and Noise Extraction from Colored Retinal Images. CSIE (6) 2009: 573-577 - [c13]Sana Nisar, Akhlaq Ahmed Khan, Muhammad Younus Javed:
A statistical feature based decision tree approach for hand gesture recognition. FIT 2009: 27:1-27:6 - 2008
- [c12]Aliya Awais, Muddassar Farooq, Muhammad Younus Javed:
Attack analysis & bio-inspired security framework for IP multimedia subsystem. GECCO 2008: 161-162 - [c11]Aliya Awais, Muddassar Farooq, Muhammad Younus Javed:
Attack analysis & bio-inspired security framework for IPMultimedia subsystem. GECCO (Companion) 2008: 2093-2098 - [c10]Hasina Attaullah, Faiza Iqbal, Muhammad Younus Javed:
Intelligent vertical handover decision model to improve QoS. ICDIM 2008: 119-124 - [c9]Saba Riaz, Muhammad Younus Javed, Muhammad Almas Anjum:
Oblivious Watermarking Based on Fast Fourier Transform Using Encryption. IPCV 2008: 329-334 - [c8]Nazir A. Malik, Muhammad Younus Javed, Umar Mahmud:
Threat Modeling in Pervasive Computing Paradigm. NTMS 2008: 1-5 - 2007
- [c7]Nabeel Younus Khan, Muhammad Younus Javed:
Efficient Fingerprint Matching Technique Using Wavelet Based Features. DICTA 2007: 253-259 - [c6]Nabeel Younus Khan, Muhammad Younus Javed, Naveed Khattak, Umer Munir Yongjun Chang:
Optimization of Core Point Detection in Fingerprints. DICTA 2007: 260-266 - 2006
- [c5]Muhammad Younus Javed, Muhammad Sohaib Hamid:
Improved phase-only correlation method for low quality fingerprint matching. ACST 2006: 135-140 - [c4]Muhammad Almas Anjum, Muhammad Younus Javed:
Face Images Dimension Reduction using Wavelets and Decimation Algorithm. IPCV 2006: 397-402 - 2005
- [c3]Javed Akhtar, Muhammad Younus Javed:
Bit Rate Along With Decomposition Level Analysis of SPIHT Algorithm. PDPTA 2005: 1269-1274 - [c2]Abdul Basit, Muhammad Younus Javed, Muhammad Almas Anjum:
Efficient Iris Recognition Method for Human Identification. WEC (2) 2005: 24-26 - [c1]Muhammad Almas Anjum, Muhammad Younus Javed, Abdul Basit:
Face Recognition Using Double Dimension Reduction. WEC (2) 2005: 43-46
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint