default search action
Mohammad Imran
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Memoona Sadaf, Zafar Iqbal, Zahid Anwar, Umara Noor, Mohammad Imran, Thippa Reddy Gadekallu:
A novel framework for detection and prevention of denial of service attacks on autonomous vehicles using fuzzy logic. Veh. Commun. 46: 100741 (2024) - 2023
- [j6]Mohammad Imran, Suraya Hamid, Maizatul Akmar Ismail:
Advancing Process Audits With Process Mining: A Systematic Review of Trends, Challenges, and Opportunities. IEEE Access 11: 68340-68357 (2023) - [j5]Kashif Javed, Naveed Anwar Bhatti, Mohammad Imran:
MOPTIC-SM: Sleep mode-enabled multi-optimized intermittent computing for transiently powered systems. J. Syst. Archit. 137: 102850 (2023) - [j4]Mohammad Imran, Eun-Bi Kim, Dong-Heui Kwak, Sadia Ameen:
Porous MgNiO2 Chrysanthemum Flower Nanostructure Electrode for Toxic Hg2+ Ion Monitoring in Aquatic Media. Sensors 23(18): 7910 (2023) - 2022
- [j3]Mohammad Imran, Maizatul Akmar Ismail, Suraya Hamid, Mohd Hairul Nizam Bin Md Nasir:
Complex Process Modeling in Process Mining: A Systematic Review. IEEE Access 10: 101515-101536 (2022) - 2021
- [c16]Mohammad Idrees Bhat, B. Sharada, Mohammad Imran, Sk Md Obaidullah:
Automatic Segmentation of Handwritten Devanagari Word Documents Enabling Accurate Recognition. MIKE 2021: 78-88 - [i3]Tapas Tripura, Mohammad Imran, Budhaditya Hazra, Souvik Chakraborty:
A change of measure enhanced near exact Euler Maruyama scheme for the solution to nonlinear stochastic dynamical systems. CoRR abs/2108.10655 (2021) - 2020
- [c15]Mohammad Idrees Bhat, B. Sharada, Sk Md Obaidullah, Mohammad Imran:
Towards Accurate Identification and Removal of Shirorekha from Off-line Handwritten Devanagari word Documents. ICFHR 2020: 234-239
2010 – 2019
- 2019
- [i2]Harbi AlMahafzah, Mohammad Imran, H. D. Supreetha Gowda:
Parametic Classification of Handvein Patterns Based on Texture Features. CoRR abs/1903.08847 (2019) - 2018
- [c14]H. D. Supreetha Gowda, Mohammad Imran, G. Hemantha Kumar:
Feature level fusion of Face and Iris using Deep Features based on Convolutional Neural Networks. ICACCI 2018: 116-119 - [c13]H. D. Supreetha Gowda, Mohammad Imran, G. Hemantha Kumar:
Performance Analysis of Log-Gabor Based Multimodal Systems and Its Fusion Techniques. RTIP2R (1) 2018: 240-254 - [c12]H. D. Supreetha Gowda, Mohammad Imran, G. Hemantha Kumar:
Multispectral Palmprint Biometric Verification System Using Deep CNN. RTIP2R (2) 2018: 505-513 - 2017
- [j2]Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir:
A comparison of feature extraction techniques for malware analysis. Turkish J. Electr. Eng. Comput. Sci. 25: 1173-1183 (2017) - [c11]H. D. Supreetha Gowda, G. Hemantha Kumar, Mohammad Imran:
Robust multimodal biometric verification system based on face and fingerprint. ICACCI 2017: 243-247 - 2016
- [j1]Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir:
Malware classification using dynamic features and Hidden Markov Model. J. Intell. Fuzzy Syst. 31(2): 837-847 (2016) - 2015
- [c10]Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir:
Similarity-Based Malware Classification Using Hidden Markov Model. CyberSec 2015: 129-134 - [c9]Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir:
Using hidden markov model for dynamic malware analysis: First impressions. FSKD 2015: 816-821 - 2013
- [c8]Shaffi Noushath, Mohammad Imran, Karan Jetly, Ashok Rao, G. Hemantha Kumar:
Multimodal biometric fusion of face and palmprint at various levels. ICACCI 2013: 1793-1798 - 2012
- [c7]Harbi AlMahafzah, Mohammad Imran, H. S. Sheshadri:
Multi-algorithm Feature Level Fusion Using Finger Knuckle Print Biometric. FGIT-FGCN/DCA 2012: 302-311 - [c6]Mohammad Imran, Ashok Rao, Shaffi Noushath, G. Hemantha Kumar:
Some Issues on Choices of Modalities for Multimodal Biometric Systems. SocProS 2012: 1513-1523 - [i1]Harbi AlMahafzah, Mohammad Imran, H. S. Sheshadri:
Multibiometric: Feature Level Fusion Using FKP Multi-Instance biometric. CoRR abs/1210.0818 (2012) - 2011
- [c5]Mohammad Imran, Ashok Rao, Hemanthakumar G.:
Extreme Subjectivity of Multimodal Biometrics Solutions: Role of Strong and Weak modalities / features information. IICAI 2011: 1587-1600 - [c4]Ali Mirza Mahmood, Mohammad Imran, Naganjaneyulu Satuluri, Mrithyumjaya Rao Kuppa, Vemulakonda Rajesh:
An Improved CART Decision Tree for Datasets with Irrelevant Feature. SEMCCO (1) 2011: 539-549 - 2010
- [c3]Ramachandra Raghavendra, Mohammad Imran, Ashok Rao, G. Hemantha Kumar:
Multimodal Biometrics: Analysis of Handvein & Palmprint Combination Used for Person Verification. ICETET 2010: 526-530 - [c2]Mohammad Imran, Ashok Rao, G. Hemantha Kumar:
Multibiometric systems: A comparative study of multi-algorithmic and multimodal approaches. Biometrics Technology 2010: 207-212
2000 – 2009
- 2003
- [c1]Kamran Iqbal, Anindo Roy, Mohammad Imran:
Passive and active contributors to postural stabilization. SMC 2003: 4502-4507
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint