default search action
Muhammad Adeel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Mohammad Mazyad Hazzazi, Souad Ahmad Baowidan, Awais Yousaf, Muhammad Adeel:
An Innovative Algorithm Based on Chaotic Maps Amalgamated with Bit-Level Permutations for Robust S-Box Construction and Its Application in Medical Image Privacy. Symmetry 16(8): 1070 (2024) - [j14]Saeed Iqbal, Aadil Raza, Mohammad Kaleem, Muhammad Iqbal, Muhammad Adeel, Salman Ghafoor:
A full duplex LG modes enabled millimeter-wave based FSO communication system for disaster zone. Wirel. Networks 30(2): 961-971 (2024) - [c24]Muhammad Adeel, Zhi-Yong Tao:
Enhancing Speech Emotion Recognition in Urdu Using Bi-GRU Networks: An In-Depth Analysis of Acoustic Features and Model Interpretability. ICIT 2024: 1-6 - 2023
- [j13]Asfandyar Khan, Syed Hamad Shirazi, Muhammad Adeel, Muhammad Assam, Yazeed Yasin Ghadi, Heba G. Mohamed, Yong Xie:
A QoS-Aware Data Aggregation Strategy for Resource Constrained IoT-Enabled AMI Network in Smart Grid. IEEE Access 11: 98988-99004 (2023) - [j12]Muhammad Adeel, Chih-Wei Peng, I-Jung Lee, Bor-Shing Lin:
Biomechanical Evaluation of Fingers Repetitive Voluntary Tasks in Chronic Stroke Survivors. IEEE Access 11: 143649-143656 (2023) - 2022
- [j11]Majid Qayyum, Muhammad Adeel, Sidra Riaz, Mehran Saeed, Irfan Ullah, Muhammad Subhan Ahmad:
Relationship and Impact of Employee Engagement on Organizational Citizenship Behavior. Int. J. Inf. Syst. Soc. Chang. 13(1): 1-23 (2022) - [c23]Muhammad Adeel, Hadeed Ahmed Sher, Ahmed Kamal Hassan, Kamal Al-Haddad:
Comparative Analysis of PV Parameter Extraction Algorithms. IECON 2022: 1-6 - 2021
- [j10]Ahsan Bin Tufail, Yong-Kui Ma, Qiu-Na Zhang, Adil Khan, Lei Zhao, Qiang Yang, Muhammad Adeel, Rahim Khan, Inam Ullah:
3D convolutional neural networks-based multiclass classification of Alzheimer's and Parkinson's diseases using PET and SPECT neuroimaging modalities. Brain Informatics 8(1): 23 (2021) - [j9]Thanin Sitthiwirattham, Ghulam Murtaza, Muhammad Aamir Ali, Sotiris K. Ntouyas, Muhammad Adeel, Jarunee Soontharanon:
On Some New Trapezoidal Type Inequalities for Twice (p, q) Differentiable Convex Functions in Post-Quantum Calculus. Symmetry 13(9): 1605 (2021)
2010 – 2019
- 2019
- [j8]Xiangling Li, Azhar Hussain, Muhammad Adeel, Ekrem Savas:
Fixed Point Theorems for Zθ-Contraction and Applications to Nonlinear Integral Equations. IEEE Access 7: 120023-120029 (2019) - [j7]Muhammad Abdullah Rafique, Muhammad Adeel:
Bandwidth Efficient Frame Structure Algorithm and Analysis: An Extension to Telemetry Standard. J. Aerosp. Inf. Syst. 16(12): 534-545 (2019) - [j6]Zhenhua Ma, Azhar Hussain, Muhammad Adeel, Nawab Hussain, Ekrem Savas:
Best Proximity Point Results for Generalized Θ-Contractions and Application to Matrix Equations. Symmetry 11(1): 93 (2019) - [c22]Shaina Ashraf, Omer Javed, Muhammad Adeel, Haider Iqbal, Rao Muhammad Adeel Nawab:
Bots and Gender Prediction Using Language Independent Stylometry-based Approach. CLEF (Working Notes) 2019 - [c21]Ammara Roohi, Muhammad Adeel, Munam Ali Shah:
DDoS in IoT: A Roadmap Towards Security & Countermeasures. ICAC 2019: 1-6 - 2018
- [c20]Muhammad Imran Tariq, Jorge Luis Díaz Martinez, Shariq Aziz Butt, Muhammad Adeel, Emiro de la Hoz Franco, Anca Mihaela Dicu:
A Learners Experience with the Games Education in Software Engineering. SOFA (2) 2018: 379-395 - 2016
- [c19]Muhammad Adeel, Nabeel ur Rehman:
Intelligent mailbox with centralized parallel processing. SNPD 2016: 255-259 - 2014
- [j5]Sardar Kashif Ashraf Khan, Jonathan Loo, Aboubaker Lasebae, Muhammad Awais Azam, Muhammad Adeel, Rehana Kausar, Humaira Sardar:
LOC algorithm: Location-aware opportunistic forwarding by using node's approximate location. Int. J. Pervasive Comput. Commun. 10(4): 481-496 (2014) - [c18]Muhammad Adeel, Laurissa N. Tokarchuk, Muhammad Awais Azam, Sardar Kashif Ashraf Khan, M. A. Khalil:
Propagation Analysis of Malware Families in Mobile P2P Networks. ITNG 2014: 220-226 - 2013
- [b1]Muhammad Adeel:
Adaptive mobile P2P malware detection using social interactions based digital footprints. Queen Mary University of London, UK, 2013 - [j4]Muhammad Awais Azam, Jonathan Loo, Usman Naeem, Muhammad Adeel:
Recognising indoor/outdoor activities of low entropy people using Bluetooth proximity and object usage data. Int. J. Pervasive Comput. Commun. 9(4): 346-366 (2013) - [j3]Muhammad Adeel, Bernhard Nett, Volker Wulf:
Microfinance in the South - from money processing to community building. Int. J. Serv. Technol. Manag. 19(1/2/3): 81-98 (2013) - [c17]Muhammad Adeel, Bernhard Nett, Turkan Gurbanova, Volker Wulf, David Randall:
The Challenges of Microfinance Innovation: Understanding 'Private Services'. ECSCW 2013: 269-286 - [c16]Muhammad Adeel, Zulfiqar Ali, Muhammad Saqib, Muhammad Tauseef, Muhammad Muaz:
Exploiting cross-over distance to optimize energy in wireless sensor networks. ICDIM 2013: 49-54 - [c15]Muhammad Adeel, Gul Muhammad Khan, Syed Mohsin Matloob Bokhari, Zeeshan Shafiq, Sahibzada Ali Mahmud:
Feature Point Video Synthesis for tagged vehicular traffic. ITST 2013: 487-492 - 2012
- [j2]Muhammad Awais Azam, Jonathan Loo, Sardar Kashif Ashraf Khan, Usman Naeem, Muhammad Adeel, Waleed Ejaz:
Behavioural Patterns Analysis of Low Entropy People Using Proximity Data. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(3): 21-40 (2012) - [c14]Muhammad Adeel, Aamir Latif, Muhammad Muaz, Sahibzada Ali Mahmud:
Energy Gain Enhancement by ECC Coded Data in Wireless Sensor Networks. FIT 2012: 13-17 - [c13]Muhammad Adeel, Muhammad Muaz, Aamir Latif, Sahibzada Ali Mahmud:
Sensitivity Level Enhancement in Vehicular DGPS Receivers to Provide Exact Location Tracking on Sub-lane of a Highway. FIT 2012: 292-297 - [c12]Muhammad Muaz, Abdul Rehman, Mansoor Ali Shah, M. Usman, Muhammad Adeel, Gul Muhammad Khan, Sahibzada Ali Mahmud:
Power efficient dynamic topology in 3G cellular networks. ICTC 2012: 205-210 - [c11]Sardar Kashif Ashraf Khan, Jonathan Loo, Muhammad Awais Azam, Humaira Sardar, Muhammad Adeel, Laurissa N. Tokarchuk:
Hybrid content forwarding technique for Bluetooth communication environment. SoftCOM 2012: 1-5 - [c10]Sardar Kashif Ashraf Khan, Jonathan Loo, Muhammad Awais Azam, Humaira Sardar, Muhammad Adeel, Laurissa N. Tokarchuk:
Enhanced Lobby Influence: Knowledge based content forwarding algorithm for opportunistic communication networks. SoftCOM 2012: 1-5 - [c9]Muhammad Adeel, S. A. Mahmud, Gul Muhammad Khan:
Adjacent Vehicle Collision Avoidance Protocol in Mitigating the Probability of Adjacent Vehicle Collision. VTC Fall 2012: 1-5 - [c8]Muhammad Adeel, S. A. Mahmud, Gul Muhammad Khan:
Condition of Constant Frequency of RICIAN Channel Variation Achieved during Inter-Vehicular Communication. VTC Fall 2012: 1-5 - 2011
- [c7]Muhammad Adeel, Laurissa N. Tokarchuk:
Analysis of Mobile P2P Malware Detection Framework through Cabir & Commwarrior Families. SocialCom/PASSAT 2011: 1335-1343 - [c6]Muhammad Adeel, Laurissa N. Tokarchuk:
MPeersim: Simulation environment for mobile P2P networks. SoftCOM 2011: 1-6 - 2010
- [c5]Simon Plogmann, Muhammad Adeel, Bernhard Nett, Volker Wulf:
The Role of Social Capital and Cooperation Infrastructures Within Microfinance. COOP 2010: 223-243 - [c4]Muhammad Adeel, Bernhard Nett, Volker Wulf:
Innovating the field level of microfinance: a Pakistan case study. ICTD 2010: 1:1-1:10
2000 – 2009
- 2009
- [j1]Muhammad Adeel, Laurissa N. Tokarchuk, Laurie G. Cuthbert, Chao-sheng Feng, Zhiguang Qin:
Improved Distributed Framework for Worm Detection & Throttling in Mobile Peer-to-Peer Networks. J. Digit. Content Technol. its Appl. 3(2): 120-126 (2009) - [c3]Muhammad Adeel, Laurissa N. Tokarchuk, Laurie G. Cuthbert, Chao-sheng Feng, Zhiguang Qin:
A Distributed Framework for Passive Worm Detection and Throttling in P2P Networks. CCNC 2009: 1-5 - 2007
- [c2]Muhammad Adeel, Ahmad Ali Iqbal:
TCP Congestion Window Optimization for CDMA2000 Packet Data Networks. ITNG 2007: 31-35 - 2006
- [c1]Muhammad Adeel:
Layered Call Admission Policy for 3G Cellular Data Networks: A CDMA2000 Case Study. ICWN 2006: 71-77
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint