default search action
Muhammad Umair Khan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c8]Meriem Bettayeb, Eman Hassan, Muhammad Umair Khan, Yasmin Halawani, Hani H. Saleh, Baker Mohammad:
Adapting Spatial Transformer Networks Across Diverse Hardware Platforms: A Comprehensive Implementation Study. AICAS 2024: 547-551 - 2023
- [j7]Muhammad Umair Khan, Jungmin Kim, Mahesh Y. Chougale, Rayyan Ali Shaukat, Qazi Muhammad Saqib, Swapnil R. Patil, Baker Mohammad, Jinho Bae:
Advancement in Soft Iontronic Resistive Memory Devices and Their Application for Neuromorphic Computing. Adv. Intell. Syst. 5(2) (2023) - [c7]Muhammad Umair Khan, Baker Mohammad:
Vacancy Modulated Analog Resistive Switching Memory Device Based on Bilayer of Zn@ZnO/ZnO for Neuromorphic Computing. ICECS 2023: 1-4 - 2022
- [j6]Shanza Abbas, Muhammad Umair Khan, Scott Uk-Jin Lee, Asad Abbas, Ali Kashif Bashir:
A Review of NLIDB With Deep Learning: Findings, Challenges and Open Issues. IEEE Access 10: 14927-14945 (2022) - [j5]Mohammad Hijji, Bilal Ahmad, Gulzar Alam, Ahmed Alwakeel, Mohammed Alwakeel, Lubna Abdulaziz Alharbi, Ahd Aljarf, Muhammad Umair Khan:
Cloud Servers: Resource Optimization Using Different Energy Saving Techniques. Sensors 22(21): 8384 (2022) - 2021
- [j4]Zhiqiang Wu, Xin Chen, Muhammad Umair Khan, Scott Uk-Jin Lee:
Enhancing Fidelity of Description in Android Apps With Category-Based Common Permissions. IEEE Access 9: 105493-105505 (2021) - [j3]Muhammad Umair Khan, Scott Uk-Jin Lee, Shanza Abbas, Asad Abbas, Ali Kashif Bashir:
Detecting Wake Lock Leaks in Android Apps Using Machine Learning. IEEE Access 9: 125753-125767 (2021) - [j2]Muhammad Umair Khan, Tania Habib:
Concurrent speakers localization using blind source separation and microphone array geometry. Multidimens. Syst. Signal Process. 32(4): 1159-1184 (2021) - [j1]Muhammad Umair Khan, Shanza Abbas, Scott Uk-Jin Lee, Asad Abbas:
Measuring power consumption in mobile devices for energy sustainable app development: A comparative study and challenges. Sustain. Comput. Informatics Syst. 31: 100589 (2021) - 2020
- [b1]Muhammad Umair Khan:
Robust adaptive type-2 neural fuzzy sliding mode control of a class of nonlinear systems (Bir doğrusal olmayan sistemler sınıfının gürbüz uyarlanır tip-2 sinirsel bulanık kayan kipli kontrolü). Gaziantep University, Turkey, 2020 - [i1]Muhammad Umair Khan, Khawar Saeed, Sidra Qadeer:
Weight Training Analysis of Sportsmen with Kinect Bioinformatics for Form Improvement. CoRR abs/2009.09776 (2020)
2010 – 2019
- 2019
- [c6]Muhammad Mohsin, Muhammad Umair Khan:
UML-SR: A Novel Security Requirements Specification Language. QRS 2019: 342-349 - 2018
- [c5]Rehan Tariq, Farhan Aadil, Muhammad Faizan Malik, Sadia Ejaz Sheikh, Muhammad Umair Khan, Muhammad Fahad Khan:
Directed Acyclic Graph Based Task Scheduling Algorithm for Heterogeneous Systems. IntelliSys (2) 2018: 936-947 - 2016
- [c4]Shafiq ur Réhman, Muhammad Umair Khan:
A Reliable and Secure Virtualized Clinical Assistance Tool for Doctors and Patients. FNC/MobiSPC 2016: 441-446 - [c3]Shafiq ur Réhman, Muhammad Umair Khan:
Security and Reliability Requirements for a Virtual Classroom. FNC/MobiSPC 2016: 447-452 - 2015
- [c2]Muhammad Umair Khan:
Representing Security Specifications in UML State Machine Diagrams. FNC/MobiSPC 2015: 453-458 - 2012
- [c1]Rana Atif Ali Khan, Muhammad Umair Khan, Muneeb Iqbal:
Multilevel Graph Partitioning Scheme to Solve Traveling Salesman Problem. ITNG 2012: 458-463
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint