default search action
Awais Adnan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j18]Adnan Amin, Awais Adnan, Sajid Anwar:
An adaptive learning approach for customer churn prediction in the telecommunication industry using evolutionary computation and Naïve Bayes. Appl. Soft Comput. 137: 110103 (2023) - [j17]Kaleem Ullah, Imran Ahmed, Misbah Ahmad, Arif Ur Rahman, Muhammad Nawaz, Awais Adnan:
Rotation invariant person tracker using top view. J. Ambient Intell. Humaniz. Comput. 14(11): 15343-15359 (2023) - 2021
- [j16]Haji Gul, Adnan Amin, Awais Adnan, Kaizhu Huang:
A Systematic Analysis of Link Prediction in Complex Network. IEEE Access 9: 20531-20541 (2021) - [j15]Muhammad Atif Butt, Asad Masood Khattak, Sarmad Shafique, Bashir Hayat, Saima Abid, Ki-Il Kim, Muhammad Waqas Ayub, Ahthasham Sajid, Awais Adnan:
Convolutional Neural Network Based Vehicle Classification in Adverse Illuminous Conditions for Intelligent Transportation Systems. Complex. 2021: 6644861:1-6644861:11 (2021) - 2020
- [j14]Fakhri Alam Khan, Ateeq Ur Rehman Butt, Muhammad Asif, Hanan Aljuaid, Awais Adnan, Sadaf Shaheen, Inam Ul Haq:
Burnt Human Skin Segmentation and Depth Classification Using Deep Convolutional Neural Network (DCNN). J. Medical Imaging Health Informatics 10(10): 2421-2429 (2020) - 2019
- [j13]Shah Nazir, Muhammad Nawaz Khan, Sajid Anwar, Awais Adnan, Shahla Asadi, Sara Shahzad, Shaukat Ali:
Big Data Visualization in Cardiology - A Systematic Review and Future Directions. IEEE Access 7: 115945-115958 (2019) - [j12]Shah Nazir, Muhammad Nawaz, Awais Adnan, Sara Shahzad, Shahla Asadi:
Big Data Features, Applications, and Analytics in Cardiology - A Systematic Literature Review. IEEE Access 7: 143742-143771 (2019) - [j11]Imran Ahmed, Misbah Ahmad, Awais Adnan, Awais Ahmad, Murad Khan:
Person detector for different overhead views using machine learning. Int. J. Mach. Learn. Cybern. 10(10): 2657-2668 (2019) - 2018
- [j10]Naila Habib Khan, Awais Adnan:
Urdu Optical Character Recognition Systems: Present Contributions and Future Directions. IEEE Access 6: 46019-46046 (2018) - [j9]Adnan Amin, Babar Shah, Sajid Anwar, Feras N. Al-Obeidat, Asad Masood Khattak, Awais Adnan:
A prudent based approach for compromised user credentials detection. Clust. Comput. 21(1): 423-441 (2018) - [j8]Naila Habib Khan, Awais Adnan, Sadia Basar:
Urdu ligature recognition using multi-level agglomerative hierarchical clustering. Clust. Comput. 21(1): 503-514 (2018) - [j7]Imran Ahmed, Awais Adnan:
A robust algorithm for detecting people in overhead views. Clust. Comput. 21(1): 633-654 (2018) - 2017
- [j6]Adnan Amin, Sajid Anwar, Awais Adnan, Muhammad Nawaz, Khalid Alawfi, Amir Hussain, Kaizhu Huang:
Customer churn prediction in the telecommunication sector using a rough set approach. Neurocomputing 237: 242-254 (2017) - [j5]Muhammad Khalid, Zahid Ullah, Naveed Ahmad, Muhammad Arshad, Bilal Jan, Yue Cao, Awais Adnan:
A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks. J. Sensors 2017: 7539751:1-7539751:17 (2017) - [j4]Naila Habib Khan, Awais Adnan:
Ego-motion estimation concepts, algorithms and challenges: an overview. Multim. Tools Appl. 76(15): 16581-16603 (2017) - 2016
- [j3]Adnan Amin, Sajid Anwar, Awais Adnan, Muhammad Nawaz, Newton Howard, Junaid Qadir, Ahmad Y. A. Hawalah, Amir Hussain:
Comparing Oversampling Techniques to Handle the Class Imbalance Problem: A Customer Churn Prediction Case Study. IEEE Access 4: 7940-7957 (2016) - [j2]Tahira Khalil, Javed Iqbal, Awais Adnan:
Low level Visio-Temporal Features for Violence Detection in Cartoon Videos. J. Multim. Process. Technol. 7(4): 135-143 (2016) - 2015
- [j1]Muhammad Ali, Mah-Rukh Fida, Ameer Shakayb Arsalaan, Awais Adnan:
Implementation and Analysis of Clustering Techniques Applied on Pocket Switched Network. Int. J. Distributed Sens. Networks 11: 239591:1-239591:6 (2015)
Conference and Workshop Papers
- 2022
- [c12]Misbah Ahmad, Awais Adnan, Abdellah Chehri:
A Real-Time IoT and Image Processing based Weeds Classification System for Selective Herbicide. VTC Spring 2022: 1-5 - 2019
- [c11]Altaf U. Din, Awais Adnan:
Text to Code: Pseudo Code Generation. ICCASA/ICTCC 2019: 20-37 - [c10]Izbaila Imtiaz, Imran Ahmed, Misbah Ahmad, Kaleem Ullah, Awais Adnan, Maaz Ahmad:
Segmentation of Skin Lesion Using Harris Corner Detection and Region Growing. UEMCON 2019: 614-619 - [c9]Misbah Ahmad, Imran Ahmed, Awais Adnan:
Overhead View Person Detection Using YOLO. UEMCON 2019: 627-633 - [c8]Muhammad Khan, Muhammad Nawaz, Qazi Nida ur Rehman, Ghulam Masood, Awais Adnan, Sajid Anwar, John Cosmas:
Multiple Moving Vehicle Speed Estimation Using Blob Analysis. WorldCIST (2) 2019: 303-314 - 2018
- [c7]Awais Adnan, Sajid Anwar, Tehseen Zia, Muhammad Saad Razzaq, Fahad Maqbool, Zia Ur Rehman:
Beyond Beall's Blacklist: Automatic Detection of Open Access Predatory Research Journals. HPCC/SmartCity/DSS 2018: 1692-1697 - [c6]Imran Ahmed, Qazi Nida ur Rehman, Ghulam Masood, Awais Adnan, Awais Ahmad, Seungmin Rho:
Segmentation of affected skin lesion with blind deconvolution and L*a*b colour space. SAC 2018: 634-639 - [c5]Misbah Ahmad, Imran Ahmed, Kaleem Ullah, Iqbal Khan, Awais Adnan:
Robust Background Subtraction Based Person's Counting From Overhead View. UEMCON 2018: 746-752 - 2015
- [c4]Sadique Ahmad, Awais Adnan:
Machine learning based cognitive skills calculations for different emotional conditions. ICCI*CC 2015: 162-168 - 2013
- [c3]Muhammad Nawaz, John Cosmas, Awais Adnan, Muhammad Inam Ul Haq, Eman Alazawi:
Foreground detection using background subtraction with histogram. BMSB 2013: 1-5 - [c2]Sajjad Ahmad Bhatti, Asim Riaz Mohammad Ali, Khawaja Muhammad Saqib, Awais Adnan:
Assessment of capacity and performance of decentralized EMIS activities in developing countries. ICDIM 2013: 155-160 - 2011
- [c1]Mah-Rukh Fida, Muhammad Ali, Awais Adnan, Ameer Shakayb Arsalaan:
Region-Based Security Architecture for DTN. ITNG 2011: 387-392
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint