Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Likely matches
- Mubashir Husain Rehmani
- Mohammad Iftekhar Husain
California State Polytechnic University, Pomona, CA, USA - Masud Husain
- Mohammad Husain
- Mirza Galib Anwarul Husain Baig
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 634 matches
- 2024
- Mhamad Bakro, Rakesh Ranjan Kumar, Mohammad Husain, Zubair Ashraf, Arshad Ali, Syed Irfan Yaqoob, Mohammad Nadeem Ahmed, Nikhat Parveen:
Building a Cloud-IDS by Hybrid Bio-Inspired Feature Selection Algorithms Along With Random Forest Model. IEEE Access 12: 8846-8874 (2024) - Nadia Alfriehat, Mohammed Anbar, Mohammad Adnan Aladaileh, Iznan Husainy Hasbullah, Tamarah A. Shurbaji, Shankar Karuppayah, Ammar Almomani:
RPL-based attack detection approaches in IoT networks: review and taxonomy. Artif. Intell. Rev. 57(9): 248 (2024) - Muhammad Muneeb Saad, Ruairi O'Reilly, Mubashir Husain Rehmani:
A survey on training challenges in generative adversarial networks for biomedical image analysis. Artif. Intell. Rev. 57(2): 19 (2024) - Kashif Akram, Muhammad Usman Bhutta, Shahid Ikramullah Butt, Syed Husain Imran Jaffery, Mushtaq Khan, Alam Zeb, Zahid Faraz:
A Pareto-optimality based black widow spider algorithm for energy efficient flexible job shop scheduling problem considering new job insertion. Appl. Soft Comput. 164: 111937 (2024) - Saurabh Shukla, Shahid Hussain, Reyazur Rashid Irshad, Ahmed Abdu Alattab, Subhasis Thakur, John G. Breslin, Mohd Fadzil Hassan, Satheesh Abimannan, Moh. Shahid Husain, Syed Muslim Jameel:
Network analysis in a peer-to-peer energy trading model using blockchain and machine learning. Comput. Stand. Interfaces 88: 103799 (2024) - Mohammed Abdulla Salim Al Husaini, Mohamed Hadi Habaebi, Md. Rafiqul Islam:
Real-time thermography for breast cancer detection with deep learning. Discov. Artif. Intell. 4(1): 57 (2024) - Mosab Hamdan, Hashim Eltahir Ahmed Elshafie, Sayeed Haider Salih, Samah Abdelsalam, Omayma Husain, Mohammed Salih Mohammed Gismalla, Mustafa Ghaleb, Muhammad N. Marsono:
Elephant flow detection intelligence for software-defined networks: a survey on current techniques and future direction. Evol. Intell. 17(4): 2125-2143 (2024) - Bassam Al-Shargabi, Rame Jamil Al-Dwairi, Mohammed Abbas Fadhil Al-Husainy:
Using DNA to develop a lightweight symmetric encryption method to encrypt the data of IoT devices. Int. J. Electron. Secur. Digit. Forensics 16(2): 173-189 (2024) - Redhwan M. A. Saad, Mohammed Anbar, Selvakumar Manickam, Samir I. Shaheen, Iznan Husainy Hasbullah:
Neighbor discovery protocol anomaly-based detection system using neural network algorithm. Int. J. Inf. Sec. 23(3): 1787-1803 (2024) - Muhammad Islam, Mubashir Husain Rehmani, Jinjun Chen:
Differentially private enhanced permissioned blockchain for private data sharing in industrial IoT. Inf. Sci. 658: 119997 (2024) - Pradeep Kumar Gupta, Shyam Lal, Mustafa Servet Kiran, Farooq Husain:
Two dimensional cuckoo search optimization algorithm based despeckling filter for the real ultrasound images. J. Ambient Intell. Humaniz. Comput. 15(1): 921-942 (2024) - Mohammad Zunnun Khan, Mohd Shoaib, Mohammad Shahid Husain, Khair ul Nisa, Mohammad Tabrez Quasim:
Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach. J. Cloud Comput. 13(1): 42 (2024) - Miaomiao Yu, Siti Salmi Binti Jamali, Adzira Binti Husain:
Hand-drawn Illustration Design in National Wave Style Based on Deep Learning and Image Super Resolution Reconstruction. Scalable Comput. Pract. Exp. 25(5): 3989-3995 (2024) - Syed Faizan Husain, Mohammad Shoaib Abbas, Han Wang, Issam I. A. Qamhia, Erol Tutumluer, John Wallace, Matthew Hammond:
A Laboratory-Scale Evaluation of Smart Pebble Sensors Embedded in Geomaterials. Sensors 24(9): 2733 (2024) - Ramzi Halabi, Christina Gonzalez-Torres, Stephane MacLean, M. Ishrat Husain, Abhishek Pratap, Martin Alda, Benoit H. Mulsant, Abigail Ortiz:
A Novel Unsupervised Machine Learning Approach to Assess Postural Dynamics in Euthymic Bipolar Disorder. IEEE J. Biomed. Health Informatics 28(8): 4903-4911 (2024) - Eng-Jon Ong, Sameed Husain, Miroslaw Bober:
Understanding the Distributions of Aggregation Layers in Deep Neural Networks. IEEE Trans. Neural Networks Learn. Syst. 35(4): 5536-5550 (2024) - Mohammed Hassan Husain, Mahmood Ahmadi, Farhad Mardukhi:
Vehicular Fog Computing: A Survey of Architectures, Resource Management, Challenges and Emerging Trends. Wirel. Pers. Commun. 136(4): 2243-2273 (2024) - Mustafa Samir Mustafa, Mustafa Basim Abdulfatah, Husain Alaa Abdulkareem, Abubakar M. Ashir:
Iraqi Legal GPT. SSD 2024: 545-551 - Jaavid Aktar Husain, Raj Dabre, Aswanth M., Jay Gala, Thanmay Jayakumar, Ratish Puduppully, Anoop Kunchukuttan:
RomanSetu: Efficiently unlocking multilingual capabilities of Large Language Models via Romanization. ACL (1) 2024: 15593-15615 - Syed Sameed Husain, Eng-Jon Ong, Mohamed Faheem Thanveer, Lisa Silva, Miroslaw Bober:
Deep Fisher-Vector Descriptors for Image Retrieval and Scene Recognition. MVRMLM@ICMR 2024: 20-26 - Sai Shubodh Puligilla, Mohammad Omama, Husain Zaidi, Udit Singh Parihar, K. Madhava Krishna:
LIP-Loc: LiDAR Image Pretraining for Cross-Modal Localization. WACV (Workshops) 2024: 939-948 - Jaavid Aktar Husain, Raj Dabre, Aswanth Kumar, Ratish Puduppully, Anoop Kunchukuttan:
RomanSetu: Efficiently unlocking multilingual capabilities of Large Language Models models via Romanization. CoRR abs/2401.14280 (2024) - Jay P. Gala, Thanmay Jayakumar, Jaavid Aktar Husain, Aswanth Kumar M., Mohammed Safi Ur Rahman Khan, Diptesh Kanojia, Ratish Puduppully, Mitesh M. Khapra, Raj Dabre, V. Rudra Murthy, Anoop Kunchukuttan:
Airavata: Introducing Hindi Instruction-tuned LLM. CoRR abs/2401.15006 (2024) - Muhammad Muneeb Saad, Mubashir Husain Rehmani, Ruairi O'Reilly:
Early Stopping Criteria for Training Generative Adversarial Networks in Biomedical Imaging. CoRR abs/2405.20987 (2024) - Asmar Nadeem, Faegheh Sardari, Robert Dawes, Syed Sameed Husain, Adrian Hilton, Armin Mustafa:
NarrativeBridge: Enhancing Video Captioning with Causal-Temporal Narrative. CoRR abs/2406.06499 (2024) - Syed Zahid Husain, Leo Separovic, Jean-François Caron, Rabah Aider, Mark Buehner, Stéphane Chamberland, Ervig Lapalme, Ron McTaggart-Cowan, Christopher Subich, Paul A. Vaillancourt, Jing Yang, Ayrton Zadra:
Leveraging data-driven weather models for improving numerical weather prediction skill through large-scale spectral nudging. CoRR abs/2407.06100 (2024) - K. M. Arefeen Sultan, Md. Hasibul Husain Hisham, Benjamin A. Orkild, Alan Morris, Eugene G. Kholmovski, Erik Bieging, Eugene Kwan, Ravi Ranjan, Edward V. R. DiBella, Shireen Y. Elhabian:
HAMIL-QA: Hierarchical Approach to Multiple Instance Learning for Atrial LGE MRI Quality Assessment. CoRR abs/2407.07254 (2024) - 2023
- Saddam Husain, Anwar Jarndal, Mohammad S. Hashmi, Fadhel M. Ghannouchi:
Accurate, Efficient and Reliable Small-Signal Modeling Approaches for GaN HEMTs. IEEE Access 11: 106833-106846 (2023) - Anand Muni Mishra, Yogesh Ramdas Shahare, Piyush Kumar Shukla, Akhtar Husain, Santar Pal Singh, Sultan Alyami, Abdullah Alghamdi, Tariq Ahamed Ahanger:
Driving a key generation strategy with training-based optimization to provide safe and effective authentication using data sharing approach in IoT healthcare. Comput. Commun. 212: 407-419 (2023) - Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen:
Anomaly Detection in Blockchain Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(1): 289-318 (2023)
skipping 604 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-07 08:26 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint