default search action
Mueen Uddin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Jalal Uddin Md Akbar, Syafiq Fauzi Kamarulzaman, Abu Jafar Md Muzahid, Md. Arafatur Rahman, Mueen Uddin:
A Comprehensive Review on Deep Learning Assisted Computer Vision Techniques for Smart Greenhouse Agriculture. IEEE Access 12: 4485-4522 (2024) - [j40]Mir Sajjad Hussain Talpur, Abdul Ahad Abro, Mansoor Ebrahim, Irfan Ali Kandhro, Selvakumar Manickam, Sham-ul-Arfeen Laghari, Abdulhalim Dandoush, Mueen Uddin:
Illuminating Healthcare Management: A Comprehensive Review of IoT-Enabled Chronic Disease Monitoring. IEEE Access 12: 48189-48209 (2024) - [j39]Md. Arafatur Rahman, Sze Wei Tan, A. Taufiq Asyhari, Ibnu Febry Kurniawan, Mohammed J. F. Alenazi, Mueen Uddin:
IoT-Enabled Intelligent Garbage Management System for Smart City: A Fairness Perspective. IEEE Access 12: 82693-82705 (2024) - [j38]Ekramul Haque Tusher, Mohd Arfian Ismail, Md. Arafatur Rahman, Ali Hamdan Alenezi, Mueen Uddin:
Email Spam: A Comprehensive Review of Optimize Detection Methods, Challenges, and Open Research Problems. IEEE Access 12: 143627-143657 (2024) - [j37]Mudassir Iftikhar, Irfan Ali Kandhro, Neha Kausar, Asadullah Kehar, Mueen Uddin, Abdulhalim Dandoush:
Plant disease management: a fine-tuned enhanced CNN approach with mobile app integration for early detection and classification. Artif. Intell. Rev. 57(7): 167 (2024) - [j36]Osama Bassam J. Rabie, Shitharth Selvarajan, Tawfiq Hasanin, Gouse Baig Mohammad, Abddulrhman M. Alshareef, Mueen Uddin:
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). Int. J. Inf. Sec. 23(1): 51-80 (2024) - [j35]Osama Bassam J. Rabie, Shitharth Selvarajan, Tawfiq Hasanin, Gouse Baig Mohammad, Abddulrhman M. Alshareef, Mueen Uddin:
Correction: A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). Int. J. Inf. Sec. 23(3): 2489 (2024) - [j34]Irfan Ali Kandhro, Fayyaz Ali, Mueen Uddin, Asadullah Kehar, Selvakumar Manickam:
Exploring aspect-based sentiment analysis: an in-depth review of current methods and prospects for advancement. Knowl. Inf. Syst. 66(7): 3639-3669 (2024) - [j33]Muniba Humayun, Raheel Siddiqi, Mueen Uddin, Irfan Ali Kandhro, Maha S. Abdelhaq, Raed A. Alsaqour:
A novel methodology for offline English handwritten character recognition using ELBP-based sequential (CNN). Neural Comput. Appl. 36(30): 19139-19156 (2024) - [j32]Usman Khalil, Mueen Uddin, Owais Ahmed Malik, Ong Wee Hong:
A Novel NFT Solution for Assets Digitization and Authentication in Cyber-Physical Systems: Blueprint and Evaluation. IEEE Open J. Comput. Soc. 5: 131-143 (2024) - [i5]Abdulhalim Dandoush, Viswanath KumarSkandPriya, Mueen Uddin, Usman Khalil:
Large Language Models meet Network Slicing Management and Orchestration. CoRR abs/2403.13721 (2024) - 2023
- [j31]Irfan Ali Kandhro, Sultan Munadi Alanazi, Fayyaz Ali, Asadullah Kehar, Kanwal Fatima, Mueen Uddin, Shankar Karuppayah:
Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures. IEEE Access 11: 9136-9148 (2023) - [j30]Hidayat Ullah, Selvakumar Manickam, Muath Obaidat, Sham-ul-Arfeen Laghari, Mueen Uddin:
Exploring the Potential of Metaverse Technology in Healthcare: Applications, Challenges, and Future Directions. IEEE Access 11: 69686-69707 (2023) - [j29]Mueen Uddin, Selvakumar Manickam, Hidayat Ullah, Muath Obaidat, Abdulhalim Dandoush:
Unveiling the Metaverse: Exploring Emerging Trends, Multifaceted Perspectives, and Future Challenges. IEEE Access 11: 87087-87103 (2023) - [j28]Hariprasath Manoharan, Shitharth Selvarajan, Rajanikanth Aluvalu, Maha S. Abdelhaq, Raed A. Alsaqour, Mueen Uddin:
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation. PeerJ Comput. Sci. 9: e1709 (2023) - 2022
- [j27]C. H. Anwar ul Hassan, Muhammad Hammad, Mueen Uddin, Jawaid Iqbal, Jawad Sahi, Saddam Hussain, Syed Sajid Ullah:
Optimizing the Performance of Data Warehouse by Query Cache Mechanism. IEEE Access 10: 13472-13480 (2022) - [j26]Usman Khalil, Mueen Uddin, Owais Ahmed Malik, Saddam Hussain:
A Blockchain Footprint for Authentication of IoT-Enabled Smart Devices in Smart Cities: State-of-the-Art Advancements, Challenges and Future Research Directions. IEEE Access 10: 76805-76823 (2022) - [j25]Farhan Ahmed Karim, Azana Hafizah Mohd Aman, Rosilah Hassan, Kashif Nisar, Mueen Uddin:
Named Data Networking: A Survey on Routing Strategies. IEEE Access 10: 90254-90270 (2022) - [j24]Xiaoe Wu, Jincheng Zhou, Maoxing Zheng, Shanwei Chen, Dan Wang, Joseph Henry Anajemba, Guangnan Zhang, Maha S. Abdelhaq, Raed A. Alsaqour, Mueen Uddin:
Cloud-based deep learning-assisted system for diagnosis of sports injuries. J. Cloud Comput. 11: 82 (2022) - [j23]Maryum Bibi, Wajid Arshad Abbasi, Wajid Aziz, Sundus Khalil, Mueen Uddin, Celestine Iwendi, Thippa Reddy Gadekallu:
A novel unsupervised ensemble framework using concept-based linguistic methods and machine learning for twitter sentiment analysis. Pattern Recognit. Lett. 158: 80-86 (2022) - [j22]Saddam Hussain, Syed Sajid Ullah, Mueen Uddin, Jawaid Iqbal, Chin-Ling Chen:
A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks. Sensors 22(3): 1072 (2022) - [j21]Kanthavel Radhakrishnan, Dhaya Ramakrishnan, Osamah Ibrahim Khalaf, Mueen Uddin, Chin-Ling Chen, Chih-Ming Wu:
A Novel Deep Learning-Based Cooperative Communication Channel Model for Wireless Underground Sensor Networks. Sensors 22(12): 4475 (2022) - [j20]Syed Sajid Ullah, Saddam Hussain, Mueen Uddin, Roobaea Alroobaea, Jawaid Iqbal, Abdullah M. Baqasah, Maha S. Abdelhaq, Raed A. Alsaqour:
A Computationally Efficient Online/Offline Signature Scheme for Underwater Wireless Sensor Networks. Sensors 22(14): 5150 (2022) - [j19]Usman Khalil, Owais Ahmed Malik, Mueen Uddin, Chin-Ling Chen:
A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions. Sensors 22(14): 5168 (2022) - [j18]Naveed Ahmed, Md. Asri Bin Ngadi, Johan Mohamad Sharif, Saddam Hussain, Mueen Uddin, Muhammad Siraj Rathore, Jawaid Iqbal, Maha S. Abdelhaq, Raed A. Alsaqour, Syed Sajid Ullah, Fatima Tul Zuhra:
Network Threat Detection Using Machine/Deep Learning in SDN-Based Platforms: A Comprehensive Analysis of State-of-the-Art Solutions, Discussion, Challenges, and Future Research Direction. Sensors 22(20): 7896 (2022) - [j17]Mohammad Javad Shayegan, Hamid Reza Sabor, Mueen Uddin, Chin-Ling Chen:
A Collective Anomaly Detection Technique to Detect Crypto Wallet Frauds on Bitcoin Network. Symmetry 14(2): 328 (2022) - [j16]Muhammad Bilal Qureshi, Muhammad Shuaib Qureshi, Saqib Tahir, Aamir Anwar, Saddam Hussain, Mueen Uddin, Chin-Ling Chen:
Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud. Symmetry 14(4): 695 (2022) - [c1]Usman Khalil, Owais Ahmed Malik, Ong Wee Hong, Mueen Uddin:
Decentralized Smart City of Things: A Blockchain Tokenization-enabled Architecture for Digitization and Authentication of Assets in Smart Cities. CCIOT 2022: 38-47 - [i4]Usman Khalil, Owais Ahmed Malik, Ong Wee Hong, Mueen Uddin:
DSCOT: An NFT-Based Blockchain Architecture for the Authentication of IoT-Enabled Smart Devices in Smart Cities. CoRR abs/2211.04803 (2022) - 2021
- [j15]Abdullah Ayub Khan, Mueen Uddin, Aftab Ahmed Shaikh, Asif Ali Laghari, Adil E. Rajput:
MF-Ledger: Blockchain Hyperledger Sawtooth-Enabled Novel and Secure Multimedia Chain of Custody Forensic Investigation Architecture. IEEE Access 9: 103637-103650 (2021) - [j14]Mueen Uddin, Khaled Salah, Raja Jayaraman, Sasa Pesic, Samer Ellahham:
Blockchain for drug traceability: Architectures and open challenges. Health Informatics J. 27(2): 146045822110112 (2021) - [j13]Mueen Uddin, Mohammed Hamdi, Abdullah Alghamdi, Mesfer Alrizq, Mohammad Sulleman Memon, Maha S. Abdelhaq, Raed A. Alsaqour:
Server consolidation: A technique to enhance cloud data center power efficiency and overall cost of ownership. Int. J. Distributed Sens. Networks 17(3): 155014772199721 (2021) - [j12]Li Hou, Qi Liu, Mueen Uddin, Hizbullah Khattak, Muhammad Asshad:
Spatiotemporal Analysis of Residents in Shanghai by Utilizing Chinese Microblog Weibo Data. Mob. Inf. Syst. 2021: 8396771:1-8396771:10 (2021) - 2020
- [j11]Jamshed Memon, Maira Sami, Rizwan Ahmed Khan, Mueen Uddin:
Handwritten Optical Character Recognition (OCR): A Comprehensive Systematic Literature Review (SLR). IEEE Access 8: 142642-142668 (2020) - [j10]Asadullah Shaikh, Mueen Uddin, Mohamed A. Elmagzoub, Abdullah Alghamdi:
PEMC: Power Efficiency Measurement Calculator to Compute Power Efficiency and CO₂ Emissions in Cloud Data Centers. IEEE Access 8: 195216-195228 (2020) - [j9]Ibrar Yaqoob, Khaled Salah, Mueen Uddin, Raja Jayaraman, Mohammed A. Omar, Muhammad Imran:
Blockchain for Digital Twins: Recent Advances and Future Research Challenges. IEEE Netw. 34(5): 290-298 (2020)
2010 – 2019
- 2018
- [j8]Celestine Iwendi, Mueen Uddin, James Adu Ansere, Pascal Nkurunziza, Joseph Henry Anajemba, Ali Kashif Bashir:
On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique. IEEE Access 6: 47258-47267 (2018) - 2017
- [j7]Aqeel Taha, Raed A. Alsaqour, Mueen Uddin, Maha S. Abdelhaq, Tanzila Saba:
Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function. IEEE Access 5: 10369-10381 (2017) - [j6]Mustafa Tareq, Raed A. Alsaqour, Maha S. Abdelhaq, Mueen Uddin:
Mobile Ad Hoc Network Energy Cost Algorithm Based on Artificial Bee Colony. Wirel. Commun. Mob. Comput. 2017 (2017) - 2015
- [j5]Raed A. Alsaqour, Maha S. Abdelhaq, Rashid A. Saeed, Mueen Uddin, Ola A. Alsukour, Mohammed Al-Hubaishi, Tariq Alahdal:
Dynamic packet beaconing for GPSR mobile ad hoc position-based routing protocol using fuzzy logic. J. Netw. Comput. Appl. 47: 32-46 (2015) - 2014
- [j4]Maha S. Abdelhaq, Raed A. Alsaqour, Mohammed Al-Hubaishi, Tariq Alahdal, Mueen Uddin:
The Impact of Resource Consumption Attack on Mobile Ad-hoc Network Routing. Int. J. Netw. Secur. 16(5): 376-381 (2014) - [j3]Raed A. Alsaqour, Maha S. Abdelhaq, Rashid A. Saeed, Mohammed Al-Hubaishi, Ola Alsaqour, Mueen Uddin, Tariq Alahdal:
Effect of mobility parameters on the inaccuracy of the position information of position-based MANET routing. Int. J. Wirel. Mob. Comput. 7(1): 68-77 (2014) - [j2]Tanzila Saba, Amjad Rehman, Ayman Altameem, Mueen Uddin:
Annotated comparisons of proposed preprocessing techniques for script recognition. Neural Comput. Appl. 25(6): 1337-1347 (2014) - 2013
- [j1]Mueen Uddin, Azizah Abdul Rahman, Naeem Uddin, Jamshed Memon, Raed A. Alsaqour, Suhail Kazi:
Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents. Int. J. Netw. Secur. 15(2): 97-105 (2013) - 2012
- [i3]Mueen Uddin, Azizah Abdul Rahman:
Virtualization Implementation Model for Cost Effective & Efficient Data Centers. CoRR abs/1206.0988 (2012) - 2010
- [i2]Mueen Uddin, Azizah Abdul Rahman:
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents. CoRR abs/1010.5036 (2010) - [i1]Mueen Uddin, Azizah Abdul Rahman:
Server Consolidation: An Approach to make Data Centers Energy Efficient and Green. CoRR abs/1010.5037 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint