default search action
Rahim Khan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Shaha Al-Otaibi, Rahim Khan, Jehad Ali, Aftab Ahmed:
Artificial intelligence and Internet of Things-enabled decision support system for the prediction of bacterial stalk root disease in maize crop. Comput. Intell. 40(1) (2024) - [j39]Muhammad Zakarya, Ayaz Ali Khan, Mohammad Reza Chalak Qazani, Hashim Ali, Mahmood Al-Bahri, Atta ur Rehman Khan, Ahmad Ali, Rahim Khan:
Sustainable computing across datacenters: A review of enabling models and techniques. Comput. Sci. Rev. 52: 100620 (2024) - [j38]Mian Ahmad Jan, Wenjing Zhang, Fazlullah Khan, Sohail Abbas, Rahim Khan:
Lightweight and smart data fusion approaches for wearable devices of the Internet of Medical Things. Inf. Fusion 103: 102076 (2024) - [j37]Mian Ahmad Jan, Wenjing Zhang, Aamir Akbar, Houbing Song, Rahim Khan, Samia Allaoua Chelloug:
A Hybrid Mutual Authentication Approach for Artificial Intelligence of Medical Things. IEEE Internet Things J. 11(1): 311-320 (2024) - [j36]Rahim Khan, Tahir Arshad, Xuefei Ma, Wang Chen, Haifeng Zhu, Yanni Wu:
Deep Spectral Spatial Feature Enhancement Through Transformer for Hyperspectral Image Classification. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - 2023
- [j35]Zhou Chen, Xianwen Zhao, Ziqi Zhou, Xuefei Ma, Qi Cheng, Xuan Cai, Bowang Jiang, Rahim Khan, Pradip Kumar Sharma, Osama Alfarraj, Amr Tolba:
The adaptive constant false alarm rate for sonar target detection based on back propagation neural network access. IET Signal Process. 17(3) (2023) - [j34]Rahim Khan, Jason Teo, Mian Ahmad Jan, Sahil Verma, Ryan Alturki, Abdullah Gani:
A Trustworthy, Reliable, and Lightweight Privacy and Data Integrity Approach for the Internet of Things. IEEE Trans. Ind. Informatics 19(1): 511-518 (2023) - 2022
- [j33]Rahim Khan, Qiang Yang, Inam Ullah, Ateeq Ur Rehman, Ahsan Bin Tufail, Alam Noor, Abdul Rehman, Korhan Cengiz:
3D convolutional neural networks based automatic modulation classification in the presence of channel noise. IET Commun. 16(5): 497-509 (2022) - [j32]Aitizaz Ali, Mohammed Amin Almaiah, Fahima Hajjej, Muhammad Fermi Pasha, Ong Huey Fang, Rahim Khan, Jason Teo, Muhammad Zakarya:
An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network. Sensors 22(2): 572 (2022) - [j31]Aftab Ahmed Khan, Muhammad Zakarya, Xuan Liu, Rahim Khan, Ahmad Ali, Ayaz Ali Khan:
Quality enhancement in a mm-wave multi-hop, multi-tier heterogeneous 5G network architecture. Telecommun. Syst. 80(2): 169-187 (2022) - [j30]Muhammad Zakarya, Lee Gillam, Hashim Ali, Izaz Ur Rahman, Khaled Salah, Rahim Khan, Omer F. Rana, Rajkumar Buyya:
epcAware: A Game-Based, Energy, Performance and Cost-Efficient Resource Management Technique for Multi-Access Edge Computing. IEEE Trans. Serv. Comput. 15(3): 1634-1648 (2022) - 2021
- [j29]Syed Rooh Ullah Jan, Rahim Khan, Mian Ahmad Jan:
An energy-efficient data aggregation approach for cluster-based wireless sensor networks. Ann. des Télécommunications 76(5-6): 321-329 (2021) - [j28]Ahsan Bin Tufail, Yong-Kui Ma, Qiu-Na Zhang, Adil Khan, Lei Zhao, Qiang Yang, Muhammad Adeel, Rahim Khan, Inam Ullah:
3D convolutional neural networks-based multiclass classification of Alzheimer's and Parkinson's diseases using PET and SPECT neuroimaging modalities. Brain Informatics 8(1): 23 (2021) - [j27]Syed Roohullah Jan, Rahim Khan, Fazlullah Khan, Mian Ahmad Jan, Mohammad Dahman Alshehri, Venki Balasubramaniam, Paramjit S. Sehdev:
Marginal and average weight-enabled data aggregation mechanism for the resource-constrained networks. Comput. Commun. 174: 101-108 (2021) - [j26]Yanbin Zhang, Ke Cheng, Fazlullah Khan, Ryan Alturki, Rahim Khan, Ateeq Ur Rehman:
A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities. J. Inf. Secur. Appl. 58: 102683 (2021) - [j25]Ayaz Ali Khan, Muhammad Zakarya, Izaz Ur Rahman, Rahim Khan, Rajkumar Buyya:
HeporCloud: An energy and performance efficient resource orchestrator for hybrid heterogeneous cloud computing environments. J. Netw. Comput. Appl. 173: 102869 (2021) - [j24]Rahim Khan, Ihsan Ali, Mian Ahmad Jan, Muhammad Zakarya, Muazzam Ali Khan Khattak, Sultan S. Alshamrani, Mohsen Guizani:
A Hybrid Approach for Seamless and Interoperable Communication in the Internet of Things. IEEE Netw. 35(6): 202-208 (2021) - [j23]Ayaz Ali Khan, Muhammad Zakarya, Rajkumar Buyya, Rahim Khan, Mukhtaj Khan, Omer F. Rana:
An Energy and Performance Aware Consolidation Technique for Containerized Datacenters. IEEE Trans. Cloud Comput. 9(4): 1305-1322 (2021) - [j22]Mian Ahmad Jan, Fazlullah Khan, Rahim Khan, Spyridon Mastorakis, Varun G. Menon, Mamoun Alazab, Paul A. Watters:
Lightweight Mutual Authentication and Privacy-Preservation Scheme for Intelligent Wearable Devices in Industrial-CPS. IEEE Trans. Ind. Informatics 17(8): 5829-5839 (2021) - [j21]Rahim Khan, Qiang Yang, Ahsan Bin Tufail, Alam Noor, Yong-Kui Ma:
Classification of Digital Modulated COVID-19 Images in the Presence of Channel Noise Using 2D Convolutional Neural Networks. Wirel. Commun. Mob. Comput. 2021: 5539907:1-5539907:15 (2021) - 2020
- [j20]Rahim Khan, Muhammad Zakarya, Ayaz Ali Khan, Izaz Ur Rahman, Mohd Amiruddin Abd Rahman, Muhammad Khalis Abdul Karim, Mohd Shafie Mustafa:
A Heuristic Approach for Finding Similarity Indexes of Multivariate Data Sets. IEEE Access 8: 21759-21769 (2020) - [j19]Muhammad Adil, Rahim Khan, Mohammed Amin Almaiah, Mohammed Al-Zahrani, Muhammad Zakarya, Muhammad Saeed Amjad, Rehan Ahmed:
MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks. IEEE Access 8: 44459-44469 (2020) - [j18]Muhammad Adil, Rahim Khan, Mohammed Amin Almaiah, Muhammad Binsawad, Jehad Ali, Adeeb Alsaaidah, Qui Thanh Hoai Ta:
An Efficient Load Balancing Scheme of Energy Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks. IEEE Access 8: 148510-148527 (2020) - [j17]Muhammad Adil, Rahim Khan, Jehad Ali, Byeong-Hee Roh, Qui Thanh Hoai Ta, Mohammed Amin Almaiah:
An Energy Proficient Load Balancing Routing Scheme for Wireless Sensor Networks to Maximize Their Lifespan in an Operational Environment. IEEE Access 8: 163209-163224 (2020) - [j16]Muhammad Nawaz Khan, Haseeb Ur Rahman, Mohammed Amin Almaiah, Muhammad Zahid Khan, Ajab Khan, Mushtaq Raza, Mohammed Al-Zahrani, Omar Almomani, Rahim Khan:
Improving Energy Efficiency With Content-Based Adaptive and Dynamic Scheduling in Wireless Sensor Networks. IEEE Access 8: 176495-176520 (2020) - [j15]Xiuping Zheng, Asma Idrees, Fazlullah Khan, Saima Anwar Lashari, Rahim Khan, Meiling Li, Muhammad Tahir, Mian Ahmad Jan:
A Reliable Communication and Load Balancing Scheme for Resource-Limited Networks. IEEE Access 8: 179921-179930 (2020) - [j14]Alam Noor, Yaqin Zhao, Anis Koubaa, Longwen Wu, Rahim Khan, Fakheraldin Y. O. Abdalla:
Automated sheep facial expression classification using deep transfer learning. Comput. Electron. Agric. 175: 105528 (2020) - [j13]Tao Han, Syed Rooh Ullah Jan, Zhiyuan Tan, Muhammad Usman, Mian Ahmad Jan, Rahim Khan, Yongzhao Xu:
A comprehensive survey of security threats and their mitigation techniques for next-generation SDN controllers. Concurr. Comput. Pract. Exp. 32(16) (2020) - [j12]Ayaz Ali Khan, Muhammad Zakarya, Rahim Khan, Izaz Ur Rahman, Mukhtaj Khan, Atta ur Rehman Khan:
An energy, performance efficient resource consolidation scheme for heterogeneous cloud datacenters. J. Netw. Comput. Appl. 150 (2020) - [j11]Alam Noor, Yaqin Zhao, Rahim Khan, Longwen Wu, Fakheraldin Y. O. Abdalla:
Median filters combined with denoising convolutional neural network for Gaussian and impulse noises. Multim. Tools Appl. 79(25-26): 18553-18568 (2020) - [j10]Izaz Ur Rahman, Muhammad Zakarya, Mushtaq Raza, Rahim Khan:
An n-state switching PSO algorithm for scalable optimization. Soft Comput. 24(15): 11297-11314 (2020) - [c1]Muhammad Adil, Rahim Khan, M. Ahmad Nawaz Ul Ghani:
Preventive Techniques of Phishing Attacks in Networks. ICACS 2020: 1-8
2010 – 2019
- 2019
- [j9]Ayaz Ali Khan, Abid Ali, Muhammad Zakarya, Rahim Khan, Mukhtaj Khan, Izaz Ur Rahman, Mohd Amiruddin Abd Rahman:
A Migration Aware Scheduling Technique for Real-Time Aperiodic Tasks Over Multiprocessor Systems. IEEE Access 7: 27859-27873 (2019) - [j8]Muhammad Sulaiman, Sohail Ahmad, Javed Iqbal, Asfandyar Khan, Rahim Khan:
Optimal Operation of the Hybrid Electricity Generation System Using Multiverse Optimization Algorithm. Comput. Intell. Neurosci. 2019: 6192980:1-6192980:12 (2019) - [j7]Rahim Khan, Muhammad Zakarya, Zhiyuan Tan, Muhammad Usman, Mian Ahmad Jan, Mukhtaj Khan:
PFARS: Enhancing throughput and lifetime of heterogeneous WSNs through power-aware fusion, aggregation, and routing scheme. Int. J. Commun. Syst. 32(18) (2019) - [j6]Syed Rooh Ullah Jan, Mian Ahmad Jan, Rahim Khan, Hakeem Ullah, Muhammad Alam, Muhammad Usman:
An Energy-Efficient and Congestion Control Data-Driven Approach for Cluster-Based Sensor Network. Mob. Networks Appl. 24(4): 1295-1305 (2019) - [j5]Rahim Khan, Ihsan Ali, Saleh M. Altowaijri, Muhammad Zakarya, Atiq Ur Rahman, Ismail Ahmedy, Anwar Khan, Abdullah Gani:
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data. Sensors 19(1): 166 (2019) - [j4]Ayaz Ali Khan, Muhammad Zakarya, Rahim Khan:
Energy-aware dynamic resource management in elastic cloud datacenters. Simul. Model. Pract. Theory 92: 82-99 (2019) - [j3]Rahim Khan:
An efficient load balancing and performance optimization scheme for constraint oriented networks. Simul. Model. Pract. Theory 96 (2019) - [j2]Ayaz Ali Khan, Muhammad Zakarya, Rahim Khan:
H2 - A Hybrid Heterogeneity Aware Resource Orchestrator for Cloud Platforms. IEEE Syst. J. 13(4): 3873-3876 (2019) - 2018
- [j1]Rahim Khan, Ihsan Ali, Muhammad Zakarya, Ahmad M. Mustafa, Muhammad Imran, Muhammad Shoaib:
Technology-Assisted Decision Support System for Efficient Water Utilization: A Real-Time Testbed for Irrigation Using Wireless Sensor Networks. IEEE Access 6: 25686-25697 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint