default search action
Muazzam Ali Khan
Person information
- affiliation: Quaid-i-Azam University, Department of Computer Science, Islamabad, Pakistan
- affiliation: National University of Sciences and Technology, Islamabad, Pakistan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j59]Abdullah Alaklabi, Arslan Munir, Muhammad Asfand Hafeez, Muazzam Ali Khan Khattak:
Z-Crypt: Chirp Z-Transform-Based Image Encryption Leveraging Chaotic Logistic Maps and Substitution Permutation Network. IEEE Access 12: 123401-123422 (2024) - [j58]Unaiza Alvi, Asad Waqar Malik, Anis Ur Rahman, Muazzam Ali Khan Khattak, Samee U. Khan:
Predicting Device Anomalous Condition in a Collaborated Industrial Environment. IEEE Trans. Ind. Informatics 20(1): 390-398 (2024) - [c27]Muhammad Zubair Khan, Muazzam Ali Khan, Belinda Copus:
Cascaded Network for Multiscale Feature Extraction. ICHI 2024: 46-50 - [c26]Muhammad Zubair Khan, Muazzam Ali Khan, Belinda Copus:
Semantic Neural Network for Micro-Vessels Extraction. ICHI 2024: 51-56 - 2023
- [j57]Muhammad Hassan Jamal, Naila Naz, Muazzam Ali Khan Khattak, Faisal Saeed, Saad Nasser Altamimi, Sultan Noman Qasem:
A Comparison of Re-Sampling Techniques for Detection of Multi-Step Attacks on Deep Learning Models. IEEE Access 11: 127446-127457 (2023) - [j56]Safi Ullah, Jawad Ahmad, Muazzam Ali Khan, Mohammed S. Alshehri, Wadii Boulila, Anis Koubaa, Sana Ullah Jan, M. Munawwar Iqbal Ch:
TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks. Comput. Networks 237: 110072 (2023) - [j55]Faneela, Muazzam Ali Khan, Suliman A. Alsuhibany, Walid El Shafai, Mujeeb Ur Rehman, Jawad Ahmad:
An Immutable Framework for Smart Healthcare Using Blockchain Technology. Comput. Syst. Sci. Eng. 46(1): 165-179 (2023) - [j54]Hasnain Ali, Syed Omer Gilani, Muhammad Jawad Khan, Mohsin Jamil, Muazzam Ali Khan Khattak:
Stacked Bin Convolutional Neural Networks based Sparse Low-Rank Regressor: Robust, Scalable and Novel Model for Memorability Prediction of Videos. Multim. Tools Appl. 82(26): 40799-40817 (2023) - [j53]Balawal Shabir, Anis Ur Rahman, Asad Waqar Malik, Rajkumar Buyya, Muazzam Ali Khan:
A federated multi-agent deep reinforcement learning for vehicular fog computing. J. Supercomput. 79(6): 6141-6167 (2023) - [c25]Anwar Sadad, Muazzam Ali Khan, Baraq Ghaleb, Fadia Ali Khan, Maha Driss, Wadii Boulila, Jawad Ahmad:
Distributed Twins in Edge Computing: Blockchain and IOTA. IWCMC 2023: 327-332 - [i4]Anwar Sadad, Muazzam Ali Khan, Baraq Ghaleb, Fadia Ali Khan, Maha Driss, Wadii Boulila, Jawad Ahmad:
Distributed Twins in Edge Computing: Blockchain and IOTA. CoRR abs/2305.07453 (2023) - 2022
- [j52]Jameel Arif, Muazzam Ali Khan, Baraq Ghaleb, Jawad Ahmad, Arslan Munir, Umer Rashid, Ahmed Yassin Al-Dubai:
A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access 10: 12966-12982 (2022) - [j51]Irum Matloob, Shoab Ahmed Khan, Rukaiya, Muazzam Ali Khan Khattak, Arslan Munir:
A Sequence Mining-Based Novel Architecture for Detecting Fraudulent Transactions in Healthcare Systems. IEEE Access 10: 48447-48463 (2022) - [j50]Samera Batool, Ali Hassan, Muazzam Ali Khan Khattak, Ahsan Shahzad, Muhammad Umar Farooq:
IoTAuth: IoT Sensor Data Analytics for User Authentication Using Discriminative Feature Analysis. IEEE Access 10: 59115-59124 (2022) - [j49]Balawal Shabir, Anis Ur Rahman, Asad Waqar Malik, Muazzam Ali Khan:
On Collective Intellect for Task Offloading in Vehicular Fog Paradigm. IEEE Access 10: 101445-101457 (2022) - [j48]Iqra Kiran, Basit Raza, Areesha Ijaz, Muazzam Ali Khan Khattak:
DenseRes-Unet: Segmentation of overlapped/clustered nuclei from multi organ histopathology images. Comput. Biol. Medicine 143: 105267 (2022) - [j47]Haseeb Hassan, Zhaoyu Ren, Chengmin Zhou, Muazzam Ali Khan Khattak, Yi Pan, Jian Zhao, Bingding Huang:
Supervised and weakly supervised deep learning models for COVID-19 CT diagnosis: A systematic review. Comput. Methods Programs Biomed. 218: 106731 (2022) - [j46]Sufian Abdul Qader Badawi, Maen Takruri, Yaman Albadawi, Muazzam Ali Khan Khattak, Ajay Kamath Nileshwar, Emad Mosalam:
Four Severity Levels for Grading the Tortuosity of a Retinal Fundus Image. J. Imaging 8(10): 258 (2022) - [j45]Fawad Masood, Wadii Boulila, Abdullah Alsaeedi, Jan Sher Khan, Jawad Ahmad, Muazzam Ali Khan, Sadaqat ur Rehman:
A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map. Multim. Tools Appl. 81(21): 30931-30959 (2022) - [j44]Safi Ullah, Muazzam Ali Khan, Jawad Ahmad, Sajjad Shaukat Jamal, Zil E. Huma, Muhammad Tahir Hassan, Nikolaos Pitropakis, Arshad Ali, William J. Buchanan:
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles. Sensors 22(4): 1340 (2022) - [j43]Safi Ullah, Jawad Ahmad, Muazzam Ali Khan, Eman H. Alkhammash, Myriam Hadjouni, Yazeed Ghadi, Faisal Saeed, Nikolaos Pitropakis:
A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering. Sensors 22(10): 3607 (2022) - [j42]Umara Umar, Sanam Nayab, Rabia Irfan, Muazzam Ali Khan, Amna Umer:
E-Cardiac Care: A Comprehensive Systematic Literature Review. Sensors 22(20): 8073 (2022) - [c24]Muhammad Zubair Khan, Yugyung Lee, Muazzam Ali Khan, Arslan Munir:
Towards Long - Range Pixels Connection for Context-Aware Semantic Segmentation. BHI 2022: 1-5 - [c23]Hasnain Ali, Syed Omer Gilani, Muhammad Jawad Khan, Asim Waris, Muazzam Ali Khan Khattak, Mohsin Jamil:
Predicting Episodic Video Memorability using Deep Features Fusion Strategy. SERA 2022: 39-46 - 2021
- [j41]Rukaiya, Shoab Ahmed Khan, Muhammad Umar Farooq, Muazzam Ali Khan Khattak, Irum Matloob, Irum Nosheen:
A Stochastic Distribution Based Methodology to Estimate Control Phase Time for Software-Defined Radios in Tactical MANETs. IEEE Access 9: 71687-71698 (2021) - [j40]Muhammad Zubair Khan, Mohan Kumar Gajendran, Yugyung Lee, Muazzam Ali Khan:
Deep Neural Architectures for Medical Image Semantic Segmentation: Review. IEEE Access 9: 83002-83024 (2021) - [j39]Sidra Minhas, Aasia Khanum, Atif Alvi, Farhan Riaz, Shoab Ahmad Khan, Fawaz Alsolami, Muazzam Ali Khan:
Early MCI-to-AD Conversion Prediction Using Future Value Forecasting of Multimodal Features. Comput. Intell. Neurosci. 2021: 6628036:1-6628036:12 (2021) - [j38]Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Abid Khan, Muazzam Ali Khan Khattak:
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud. Comput. Stand. Interfaces 78: 103522 (2021) - [j37]Ayoub el Bendali, Anis Ur Rahman, Asad Waqar Malik, Muazzam Ali Khan, Sri Devi Ravana:
On-demand multi-hop forwarding for sustainable vehicular data transfer network. Int. J. Distributed Sens. Networks 17(5): 155014772110151 (2021) - [j36]Urva Latif, Ahmad Raza Shahid, Basit Raza, Sheikh Ziauddin, Muazzam Ali Khan Khattak:
An end-to-end brain tumor segmentation system using multi-inception-UNET. Int. J. Imaging Syst. Technol. 31(4): 1803-1816 (2021) - [j35]Mengji Chen, Taj Malook, Ateeq Ur Rehman, Yar Muhammad, Mohammad Dahman Alshehri, Aamir Akbar, Muhammad Bilal, Muazzam Ali Khan:
Blockchain-Enabled healthcare system for detection of diabetes. J. Inf. Secur. Appl. 58: 102771 (2021) - [j34]Jawaid Iqbal, Arif Iqbal Umar, Noor Ul Amin, Abdul Waheed, Saleem Abdullah, Mahdi Zareei, Muazzam Ali Khan Khattak:
Efficient network selection using multi fuzzy criteria for confidential data transmission in wireless body sensor networks. J. Intell. Fuzzy Syst. 41(1): 37-55 (2021) - [j33]Muhammad Khurram Khan, Muhammad Shiraz, Qaisar Shaheen, Shariq Aziz Butt, Rizwan Akhtar, Muazzam Ali Khan Khattak, Wang Changda:
Hierarchical Routing Protocols for Wireless Sensor Networks: Functional and Performance Analysis. J. Sensors 2021: 7459368:1-7459368:18 (2021) - [j32]Yushou Tang, Jianhuan Su, Muazzam Ali Khan:
Research on Sentiment Analysis of Network Forum Based on BP Neural Network. Mob. Networks Appl. 26(1): 174-183 (2021) - [j31]Rahim Khan, Ihsan Ali, Mian Ahmad Jan, Muhammad Zakarya, Muazzam Ali Khan Khattak, Sultan S. Alshamrani, Mohsen Guizani:
A Hybrid Approach for Seamless and Interoperable Communication in the Internet of Things. IEEE Netw. 35(6): 202-208 (2021) - [j30]Muhammad Almas Khan, Muazzam Ali Khan, Sana Ullah Jan, Jawad Ahmad, Sajjad Shaukat Jamal, Awais Aziz Shah, Nikolaos Pitropakis, William J. Buchanan:
A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors 21(21): 7016 (2021) - [j29]Asad Waqar Malik, Tariq Qayyum, Anis Ur Rahman, Muazzam Ali Khan, Osman Khalid, Samee U. Khan:
xFogSim: A Distributed Fog Resource Management Framework for Sustainable IoT Services. IEEE Trans. Sustain. Comput. 6(4): 691-702 (2021) - [c22]Muhammad Zubair Khan, Yugyung Lee, Arslan Munir, Muazzam Ali Khan:
Multi-Feature Extraction with Ensemble Network for Tracing Chronic Retinal Disorders. BIBM 2021: 926-932 - [c21]Muhammad Zubair Khan, Yugyung Lee, Arslan Munir, Muazzam Ali Khan:
Detecting Chronic Vascular Damage with Attention-Guided Neural System. BIBM 2021: 1376-1380 - [c20]Mohan Kumar Gajendran, Muhammad Zubair Khan, Muazzam Ali Khan Khattak:
ECG Classification using Deep Transfer Learning. ICICT 2021: 1-5 - [c19]Muhammad Zubair Khan, Yugyung Lee, Muazzam Ali Khan Khattak:
Decision Support System to Optimize Cloud Service Prioritization for Model Deployment. ICICT 2021: 158-162 - [i3]Muhammad Almas Khan, Muazzam Ali Khan, Shahid Latif, Awais Aziz Shah, Mujeeb Ur Rehman, Wadii Boulila, Maha Driss, Jawad Ahmad:
Voting Classifier-based Intrusion Detection for IoT Networks. CoRR abs/2104.10015 (2021) - [i2]Muneeb Ahmed Khan, Muazzam Ali Khan, Maha Driss, Wadii Boulila, Jawad Ahmad:
Evolution of Target Localization in Wireless Sensor Network (WSN): A Review. CoRR abs/2107.04128 (2021) - 2020
- [j28]Muhammad Uzair, Muazzam Ali Khan Khattak, Balawal Shabir, Asad W. Malik, Muhammad Sher Ramzan:
Emergency Message Dissemination in Vehicular Networks: A Review. IEEE Access 8: 38606-38621 (2020) - [j27]Syed Sajid Ullah, Insaf Ullah, Hizbullah Khattak, Muhammad Asghar Khan, Muhammad Adnan, Saddam Hussain, Noor Ul Amin, Muazzam Ali Khan Khattak:
A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things. IEEE Access 8: 98910-98928 (2020) - [j26]Samera Batool, Ali Hassan, Nazar Abbas Saqib, Muazzam Ali Khan Khattak:
Authentication of Remote IoT Users Based on Deeper Gait Analysis of Sensor Data. IEEE Access 8: 101784-101796 (2020) - [j25]Toqeer Ali Syed, Muhammad Shoaib Siddiqui, Adnan Nadeem, Ali Alzahrani, Salman Jan, Muazzam Ali Khan Khattak:
A Novel Blockchain-Based Framework for Vehicle Life Cycle Tracking: An End-to-End Solution. IEEE Access 8: 111042-111063 (2020) - [j24]Unaiza Alvi, Muazzam Ali Khan Khattak, Balawal Shabir, Asad Waqar Malik, Sher Ramzan Muhammad:
A Comprehensive Study on IoT Based Accident Detection Systems for Smart Vehicles. IEEE Access 8: 122480-122497 (2020) - [j23]Muhammad Shahzad, Arif Iqbal Umar, Muazzam Ali Khan, Syed Hamad Shirazi, Zakir Khan, Waqas Yousaf:
Robust Method for Semantic Segmentation of Whole-Slide Blood Cell Microscopic Images. Comput. Math. Methods Medicine 2020: 4015323:1-4015323:13 (2020) - [j22]Masood Ahmad, Ateeq Ur Rehman, Nighat Ayub, Md Alshehri, Muazzam Ali Khan, Abdul Hameed, Halil Yetgin:
Security, usability, and biometric authentication scheme for electronic voting using multiple keys. Int. J. Distributed Sens. Networks 16(7): 155014772094402 (2020) - [j21]Sahar Shah, Mahnoor Khan, Ahmad Almogren, Ihsan Ali, Lianwen Deng, Heng Luo, Muazzam Ali Khan:
Corrigendum to "Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions". Sci. Program. 2020: 3671835:1-3671835:1 (2020) - [j20]Sahar Shah, Mahnoor Khan, Ahmad Almogren, Ihsan Ali, Lianwen Deng, Heng Luo, Muazzam Ali Khan, Shah Nazir:
Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions. Sci. Program. 2020: 8871315:1-8871315:31 (2020) - [j19]Bukhtawar Elahi, Asad Waqar Malik, Anis Ur Rahman, Muazzam Ali Khan:
Toward scalable cloud data center simulation using high-level architecture. Softw. Pract. Exp. 50(6): 827-843 (2020) - [i1]Muhammad Shahzad, Arif Iqbal Umar, Muazzam Ali Khan, Syed Hamad Shirazi, Zakir Khan, Waqas Yousaf:
Robust Method for Semantic Segmentation of Whole-Slide Blood Cell Microscopic Image. CoRR abs/2001.10188 (2020)
2010 – 2019
- 2019
- [j18]Syed Sarmad Shah, Muhammad Ali, Asad Waqar Malik, Muazzam Ali Khan, Sri Devi Ravana:
vFog: A Vehicle-Assisted Computing Framework for Delay-Sensitive Applications in Smart Cities. IEEE Access 7: 34900-34909 (2019) - [j17]Nousheen Akhtar, Muazzam Ali Khan, Ata Ullah, Muhammad Younus Javed:
Congestion Avoidance for Smart Devices by Caching Information in MANETS and IoT. IEEE Access 7: 71459-71471 (2019) - [j16]Muhammad Qasim Khan, Ayyaz Hussain, Saeed Ur Rehman, Umair Khan, Muazzam Maqsood, Kashif Mehmood, Muazzam Ali Khan:
Classification of Melanoma and Nevus in Digital Images for Diagnosis of Skin Cancer. IEEE Access 7: 90132-90144 (2019) - [j15]Balawal Shabir, Muazzam Ali Khan, Anis Ur Rahman, Asad W. Malik, Abdul Wahid:
Congestion Avoidance in Vehicular Networks: A Contemporary Survey. IEEE Access 7: 173196-173215 (2019) - [j14]Muneeb Ahmed Khan, Muazzam Ali Khan, Anis Ur Rahman, Asad Waqar Malik, Safdar Abbas Khan:
Exploiting cooperative sensing for accurate target tracking in industrial Internet of things. Int. J. Distributed Sens. Networks 15(12) (2019) - [c18]Imran Ahsan, Mudassar Adeel Ahmed, Saad Rehman, Muhammad Abbas, Muazzam Ali Khan:
A Novel NLP Application to Automatically Generate Text Extraction Concepts from Textual Descriptions. ICCAI 2019: 55-58 - [c17]Jawad Ahmad, Ahsen Tahir, Jan Sher Khan, Muazzam Ali Khan, Fadia Ali Khan, Arshad Ali, Zeeshan Habib:
A Partial Ligt-weight Image Encryption Scheme. UCET 2019: 1-3 - [p1]Nousheen Akhtar, Muazzam Ali Khan, Ata Ullah, Muhammad Younus Javed:
Congestion Aware and Adaptive Routing Protocols for MANETs: A Survey. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 159-169 - 2018
- [j13]Tariq Qayyum, Asad Waqar Malik, Muazzam Ali Khan Khattak, Osman Khalid, Samee U. Khan:
FogNetSim++: A Toolkit for Modeling and Simulation of Distributed Fog Environment. IEEE Access 6: 63570-63583 (2018) - [j12]Jawad Ahmad, Muazzam Ali Khan, Fawad Ahmed, Jan Sher Khan:
A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Comput. Appl. 30(12): 3847-3857 (2018) - [c16]Shoukat Ali, Muazzam Ali Khan, Jawad Ahmad, Asad Waqar Malik, Anis Ur Rahman:
Detection and prevention of Black Hole Attacks in IOT & WSN. FMEC 2018: 217-226 - [c15]Muhammad Uzair, Muazzam Ali Khan, Shaiza Mann, Muhammad Imran:
A Review: Ubiquitous Healthcare Monitoring with Mobile Phone. UEMCON 2018: 988-996 - 2017
- [j11]Jan Sher Khan, Muazzam Ali Khan, Jawad Ahmad, Seong Oun Hwang, Waqas Ahmed:
An Improved Image Encryption Scheme Based on a Non-Linear Chaotic Algorithm and Substitution Boxes. Informatica 28(4): 629-649 (2017) - [j10]Mohammad Sabzinejad Farash, Shehzad Ashraf Chaudhry, SK Hafizul Islam, Muazzam Ali Khan Khattak, Aiiad Albeshri:
Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks. Inf. Technol. Control. 46(2): 205-218 (2017) - [j9]Nazar Abbas Saqib, Muhammad Zia, Hasan Mahmood, Muazzam Ali Khan:
On Generating High-Quality Random Numbers. J. Circuits Syst. Comput. 26(2): 1750019:1-1750019:21 (2017) - [j8]Fadia Ali Khan, Jameel Ahmed, Jan Sher Khan, Jawad Ahmad, Muazzam Ali Khan:
A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S8 permutation. J. Intell. Fuzzy Syst. 33(6): 3753-3765 (2017) - [j7]Jawad Ahmad, Muazzam Ali Khan, Seong Oun Hwang, Jan Sher Khan:
A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Comput. Appl. 28(S-1): 953-967 (2017) - [c14]Fadia Ali Khan, Jameel Ahmed, Jan Sher Khan, Jawad Ahmad, Muazzam Ali Khan, Seong Oun Hwang:
A new technique for designing 8 × 8 substitution box for image encryption applications. CEEC 2017: 7-12 - [c13]Nousheen Akhtar, Muazzam Ali Khan, Ata Ullah, Muhammad Younus Javed:
Efficient Routing Strategy for Congestion Avoidance in MANETs. FIT 2017: 305-309 - [c12]Waqar Farooq, Muazzam Ali Khan, Saad Rehman, Nazar Abbas Saqib, Muhammad Abbas:
AAGV: A Cluster Based Multicast Routing Protocol for Autonomous Aerial and Ground Vehicles Communication in VANET. FIT 2017: 315-320 - [c11]Samera Batool, Nazar Abbas Saqib, Muazzam Ali Khan:
Internet of Things data analytics for user authentication and activity recognition. FMEC 2017: 183-187 - [c10]Wahid Hussain, Nazar Abbas Saqib, Muazzam Ali Khan, Wasi Haider Butt:
Botnet Traffic Analysis Using Flow Graphs. ICBBS 2017: 172-176 - [c9]Farhana Nazir, Wasi Haider Butt, Muhammad Waseem Anwar, Muazzam Ali Khan Khattak:
The Applications of Natural Language Processing (NLP) for Software Requirement Engineering - A Systematic Literature Review. ICISA 2017: 485-493 - 2016
- [j6]Sheikh Waqas Akhtar, Saad Rehman, Mahmood Akhtar, Muazzam Ali Khan, Farhan Riaz, Qaiser Chaudry, Rupert C. D. Young:
Improving the Robustness of Neural Networks Using K-Support Norm Based Adversarial Training. IEEE Access 4: 9501-9511 (2016) - [j5]Zahra Waheed, M. Usman Akram, Amna Waheed, Muazzam Ali Khan, Arslan Shaukat, Mazhar Ishaq:
Person identification using vascular and non-vascular retinal features. Comput. Electr. Eng. 53: 359-371 (2016) - [j4]Waqar Farooq, Muazzam Ali Khan, Saad Rehman:
A Novel Real Time Framework for Cluster Based Multicast Communication in Vehicular Ad Hoc Networks. Int. J. Distributed Sens. Networks 12(4): 8064908:1-8064908:18 (2016) - [c8]Rao Muzamal Liaqat, Bilal Mehboob, Nazar Abbas Saqib, Muazzam Ali Khan:
A Framework for Clustering Cardiac Patient's Records Using Unsupervised Learning Techniques. EUSPN/ICTH 2016: 368-373 - [c7]Afza Kazmi, Muazzam Ali Khan, M. Usman Akram:
DeVANET: Decentralized Software-Defined VANET Architecture. IC2E Workshops 2016: 42-47 - [c6]Amna W. Awan, Nazar Abbas Saqib, Muazzam Ali Khan:
Intelligent Actor Mobility with Event Tracking in Wireless Sensor and Actor Networks. ICPP Workshops 2016: 1-6 - [c5]Muhammad Saqlain, Wahid Hussain, Nazar Abbas Saqib, Muazzam Ali Khan:
Identification of Heart Failure by Using Unstructured Data of Cardiac Patients. ICPP Workshops 2016: 426-431 - 2015
- [j3]Waqar Farooq, Muazzam Ali Khan, Saad Rehman, Nazar Abbas Saqib:
A Survey of Multicast Routing Protocols for Vehicular Ad Hoc Networks. Int. J. Distributed Sens. Networks 11: 923086:1-923086:12 (2015) - [j2]Amna Waheed, M. Usman Akram, Shehzad Khalid, Zahra Waheed, Muazzam Ali Khan, Arslan Shaukat:
Hybrid Features and Mediods Classification based Robust Segmentation of Blood Vessels. J. Medical Syst. 39(10): 128:1-128:14 (2015) - [c4]Amna Pir Muhammad, M. Usman Akram, Muazzam Ali Khan:
Survey Based Analysis of Internet of Things Based Architectural Framework for Hospital Management System. FIT 2015: 271-276 - [c3]Amna Pir, M. Usman Akram, Muazzam Ali Khan:
Internet of things based context awareness architectural framework for HMIS. HealthCom 2015: 55-60 - [c2]Muhammad Najam Dar, M. Usman Akram, Arslan Shaukat, Muazzam Ali Khan:
ECG Based Biometric Identification for Population with Normal and Cardiac Anomalies Using Hybrid HRV and DWT Features. ICITCS 2015: 1-5 - 2013
- [j1]Tamleek Ali, Muazzam Ali Khan, Amir Hayat, Masoom Alam, Muhammad Ali:
Secure Actor Directed Localization in Wireless Sensor and Actor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [c1]Rizwan Rasul, Abdul Mutaal, Nazar Abbas Saqib, Mohammad Kaleem, Arslan Shaukat, Aasia Khanum, Muazzam Ali Khan:
FPGA Accelerated Computing Platform for MATLAB and C/C++. FIT 2013: 166-171
Coauthor Index
aka: Asad W. Malik
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint