Остановите войну!
for scientists:
default search action
Adnan Amin
- > Home > Persons > Adnan Amin
Publications
- 2024
- [j40]Haji Gul, Feras N. Al-Obeidat, Adnan Amin, Fernando Moreira:
Analyzing complex networks: Extracting key characteristics and measuring structural similarities. Expert Syst. J. Knowl. Eng. 41(1) (2024) - 2023
- [j39]Adnan Amin, Awais Adnan, Sajid Anwar:
An adaptive learning approach for customer churn prediction in the telecommunication industry using evolutionary computation and Naïve Bayes. Appl. Soft Comput. 137: 110103 (2023) - [j38]Abdul Khan, Feras N. Al-Obeidat, Afsheen Khalid, Adnan Amin, Fernando Moreira:
Sentence embedding approach using LSTM auto-encoder for discussion threads summarization. Comput. Sci. Inf. Syst. 20(4): 1367-1387 (2023) - 2022
- [j37]Haji Gul, Feras N. Al-Obeidat, Adnan Amin, Muhammad Tahir, Kaizhu Huang:
Efficient link prediction model for real-world complex networks using matrix-forest metric with local similarity features. J. Complex Networks 10(5) (2022) - [c45]Haji Gul, Feras N. Al-Obeidat, Adnan Amin, Muhammad Tahir, Fernando Moreira:
A Systematic Analysis of Community Detection in Complex Networks. ANT/EDI40 2022: 343-350 - [c44]Feras N. Al-Obeidat, Mariam Ishaq, Ahmed Shuhaiber, Adnan Amin:
Twitter sentiment analysis to understand students' perceptions about online learning during the Covid'19. ICCA 2022: 1-7 - 2021
- [j36]Haji Gul, Adnan Amin, Awais Adnan, Kaizhu Huang:
A Systematic Analysis of Link Prediction in Complex Network. IEEE Access 9: 20531-20541 (2021) - [c43]Haji Gul, Adnan Amin, Furqan Nasir, Sher Jeel Ahmad, Muhammad Wasim:
Link Prediction Using Double Degree Equation with Mutual and Popular Nodes. WorldCIST (4) 2021: 328-337 - 2020
- [j35]Sadique Ahmad, Muhammad Shahid Anwar, Mansoor Ebrahim, Wahab Khan, Kamran Raza, Syed Hasan Adil, Adnan Amin:
Deep Network for the Iterative Estimations of Students' Cognitive Skills. IEEE Access 8: 103100-103113 (2020) - [j34]Adnan Amin, Feras N. Al-Obeidat, Babar Shah, May Al Taei, Changez Khan, Hamood Ur Rehman Durrani, Sajid Anwar:
Just-in-time customer churn prediction in the telecommunication sector. J. Supercomput. 76(6): 3924-3948 (2020) - 2019
- [j33]Saleh Shah, Babar Shah, Adnan Amin, Feras N. Al-Obeidat, Francis Chow, Fernando Moreira, Sajid Anwar:
Compromised user credentials detection in a digital enterprise using behavioral analytics. Future Gener. Comput. Syst. 93: 407-417 (2019) - [j32]Adnan Amin, Babar Shah, Asad Masood Khattak, Fernando Moreira, Gohar Ali, Álvaro Rocha, Sajid Anwar:
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods. Int. J. Inf. Manag. 46: 304-319 (2019) - [c42]Adnan Amin, Babar Shah, Ali Abbas, Sajid Anwar, Omar Alfandi, Fernando Moreira:
Features Weight Estimation Using a Genetic Algorithm for Customer Churn Prediction in the Telecom Sector. WorldCIST (2) 2019: 483-491 - 2018
- [j31]Sadique Ahmad, Kan Li, Adnan Amin, Salabat Khan:
A Novel Technique for the Evaluation of Posterior Probabilities of Student Cognitive Skills. IEEE Access 6: 53153-53167 (2018) - [j30]Sadique Ahmad, Kan Li, Adnan Amin, Muhammad Shahid Anwar, Wahab Khan:
A Multilayer Prediction Approach for the Student Cognitive Skills Measurement. IEEE Access 6: 57470-57484 (2018) - [j29]Adnan Amin, Babar Shah, Sajid Anwar, Feras N. Al-Obeidat, Asad Masood Khattak, Awais Adnan:
A prudent based approach for compromised user credentials detection. Clust. Comput. 21(1): 423-441 (2018) - [c41]Sadique Ahmad, Kan Li, Adnan Amin, Muhammad Yasir Faheem:
Simulation of Student Skills: The Novel Technique Based on Quantization of Cognitive Skills Outcomes. ICCI*CC 2018: 97-102 - [c40]Adnan Amin, Babar Shah, Asad Masood Khattak, Thar Baker, Hamood ur Rahman Durani, Sajid Anwar:
Just-in-time Customer Churn Prediction: With and Without Data Transformation. CEC 2018: 1-6 - 2017
- [j28]Adnan Amin, Sajid Anwar, Awais Adnan, Muhammad Nawaz, Khalid Alawfi, Amir Hussain, Kaizhu Huang:
Customer churn prediction in the telecommunication sector using a rough set approach. Neurocomputing 237: 242-254 (2017) - [c39]Adnan Amin, Sajid Anwar, Babar Shah, Asad Masood Khattak:
Compromised User Credentials Detection Using Temporal Features: A Prudent Based Approach. ICCAE 2017: 104-110 - 2016
- [j27]Adnan Amin, Sajid Anwar, Awais Adnan, Muhammad Nawaz, Newton Howard, Junaid Qadir, Ahmad Y. A. Hawalah, Amir Hussain:
Comparing Oversampling Techniques to Handle the Class Imbalance Problem: A Customer Churn Prediction Case Study. IEEE Access 4: 7940-7957 (2016) - 2015
- [j26]Changez Khan, Sajid Anwar, Shariq Bashir, Abdul Rauf, Adnan Amin:
Site selection for food distribution using rough set approach and TOPSIS method. J. Intell. Fuzzy Syst. 29(6): 2413-2419 (2015) - [c38]Adnan Amin, Faisal Rahim, Muhammad Ramzan, Sajid Anwar:
A Prudent Based Approach for Customer Churn Prediction. BDAS 2015: 320-332 - [c37]Adnan Amin, Faisal Rahim, Imtiaz Ali, Changez Khan, Sajid Anwar:
A Comparison of Two Oversampling Techniques (SMOTE vs MTDF) for Handling Class Imbalance Problem: A Case Study of Customer Churn Prediction. WorldCIST (1) 2015: 215-225 - [p1]Adnan Amin, Saeed Shehzad, Changez Khan, Imtiaz Ali, Sajid Anwar:
Churn Prediction in Telecommunication Industry Using Rough Set Approach. New Trends in Computational Collective Intelligence 2015: 83-95 - 2014
- [c36]Adnan Amin, Changez Khan, Imtiaz Ali, Sajid Anwar:
Customer Churn Prediction in Telecommunication Industry: With and without Counter-Example. ENIC 2014: 134-137 - [c35]Adnan Amin, Changez Khan, Imtiaz Ali, Sajid Anwar:
Customer Churn Prediction in Telecommunication Industry: With and without Counter-Example. MICAI (2) 2014: 206-218
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint