default search action
Asjad Amin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Muhammad Abdullah Sandhu, Asjad Amin, Sana Tariq, Shafaq Mehmood:
Aedes Aegypti larvae detection and tracking in turbid videos by semantic segmentation using deep learning. J. Intell. Fuzzy Syst. 46(1): 2009-2021 (2024) - [j9]Anum Farooq, Sana Tariq, Asjad Amin, Muhammad Ali Qureshi, Kashif Hussain Memon:
Towards the design of new cryptographic algorithm and performance evaluation measures. Multim. Tools Appl. 83(4): 9709-9759 (2024) - [j8]Sana Tariq, Asjad Amin:
DeepCTF: transcription factor binding specificity prediction using DNA sequence plus shape in an attention-based deep learning model. Signal Image Video Process. 18(6-7): 5239-5251 (2024) - 2023
- [j7]Aoun Muhammad, Asjad Amin:
Quantitative evaluation measures for DC-DC converters. IEICE Electron. Express 20(9): 20230117 (2023) - [j6]Muhammad Abdullah Sandhu, Asjad Amin:
Dengue larvae detection and tracking using CNN and kalman filtering. J. Intell. Fuzzy Syst. 44(4): 6387-6401 (2023) - 2020
- [j5]Asjad Amin, Muhammad Ali Qureshi:
A novel image retrieval technique using automatic and interactive segmentation. Int. Arab J. Inf. Technol. 17(3): 404-410 (2020)
2010 – 2019
- 2019
- [j4]Wajahat Khalid, Asma Sattar, Muhammad Ali Qureshi, Asjad Amin, Mobeen Ahmed Malik, Kashif Hussain Memon:
A smart wireless sensor network node for fire detection. Turkish J. Electr. Eng. Comput. Sci. 27(4): 2541-2556 (2019) - [j3]Mohamed A. Deriche, Asjad Amin, Muhammad Ali Qureshi:
Color image segmentation by combining the convex active contour and the Chan Vese model. Pattern Anal. Appl. 22(2): 343-357 (2019) - [i2]Zhiling Long, Yazeed Alaudah, Muhammad Ali Qureshi, Motaz Al Farraj, Zhen Wang, Asjad Amin, Mohamed A. Deriche, Ghassan AlRegib:
Characterization of migrated seismic volumes using texture attributes: a comparative study. CoRR abs/1901.10909 (2019) - 2018
- [i1]Zhiling Long, Yazeed Alaudah, Muhammad Ali Qureshi, Yuting Hu, Zhen Wang, Motaz Alfarraj, Ghassan AlRegib, Asjad Amin, Mohamed A. Deriche, Suhail Al-Dharrab, Haibin Di:
A comparative study of texture attributes for characterizing subsurface structures in seismic volumes. CoRR abs/1812.08263 (2018) - 2017
- [j2]Muhammad Ali Qureshi, Mohamed A. Deriche, Azeddine Beghdadi, Asjad Amin:
A critical survey of state-of-the-art image inpainting quality assessment metrics. J. Vis. Commun. Image Represent. 49: 177-191 (2017) - 2016
- [j1]Asjad Amin, Mohamed A. Deriche:
Salt-Dome Detection Using a Codebook-Based Learning Model. IEEE Geosci. Remote. Sens. Lett. 13(11): 1636-1640 (2016) - 2015
- [c8]Asjad Amin, Mohamed A. Deriche:
A hybrid approach for salt dome detection in 2D and 3D seismic data. ICIP 2015: 2537-2541 - 2014
- [c7]Asjad Amin, Mohamed A. Deriche:
Robust image segmentation based on convex active contours and the Chan Vese model. GlobalSIP 2014: 1044-1048 - [c6]Zhen Wang, Zhiling Long, Ghassan Al-Regib, Asjad Amin, Mohamed A. Deriche:
Automatic fault tracking across seismic volumes via tracking vectors. ICIP 2014: 5851-5855 - 2013
- [c5]Iftikhar Rasheed, Asjad Amin, Mahwish Chaudhary, Sadaf Bukhari, Muhammad Rizwan, Kashif Ali:
Analyzing the security techniques used in LTE Advanced and their evaluation. ICDIM 2013: 11-13 - 2011
- [c4]Asjad Amin, Kanwal Afreen, Abida Shaheen, Tayyabah Nadeem, Nida Rashid:
Bandwidth Efficient TCP Frame Design without Acknowledgment Number Field. CN 2011: 232-241 - [c3]Asjad Amin, Danyal Shafi, Zeeshan Ahmed, Waqas Anjum, Muhammad Owais, Faheem Akram:
Incorporating Small Length Data Cells in TCP Frame to Reduce Retransmission of Corrupted Packets. CN 2011: 242-252 - [c2]Asjad Amin, Haseeb Ahmed, Abubakar Rafique, Muhammad Junaid Nawaz, Muhammad Salahudin, Zulfiqar Ahmed:
Designing a hierarchical DHCP server's model to automatically provide dedicated IP address anywhere in the world with mobility. ICITST 2011: 250-253 - [c1]Asjad Amin, Haseeb Ahmad Qureshi, Muhammad Junaid Nawaz, Muhammad Yasir Habib, Waqas Anjum:
Modified run length encoding scheme with introduction of bit stuffing for efficient data compression. ICITST 2011: 668-672
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-07 21:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint