
Muhammad Umar Farooq
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j8]Muhammad Umar Farooq
, Hyun-Woo Baek
, Sungmin Seung
, Kyoungrae Cha, Heon You, Dong-Soo Kwon
, Seong Young Ko
:
A Stiffness Adjustable 6-DOF Robotic System for Pituitary Tumor Resection Under MRI. IEEE Access 8: 192557-192568 (2020) - [c17]Muhammad Umar Farooq, Saeedeh Moloudi, Michael Lentmaier:
Generalized LDPC Codes with Convolutional Code Constraints. ISIT 2020: 479-484 - [c16]Muhammad Umar Farooq, Farah Adeeba, Sarmad Hussain, Sahar Rauf, Maryam Khalid:
Enhancing Large Vocabulary Continuous Speech Recognition System for Urdu-English Conversational Code-Switched Speech. O-COCOSDA 2020: 155-159 - [c15]Muhammad Umar Farooq, Xingfu Wang, Ammar Hawbani, Asad Khan, Adeel Ahmed, Fisseha Teju Wedaj:
TORP: Load Balanced Reliable Opportunistic Routing for Asynchronous Wireless Sensor Networks. TrustCom 2020: 1384-1389 - [c14]Muhammad Umar Farooq
, Seong Young Ko:
A 6-DOF hybrid actuation system for a medical robot under MRI environment. UR 2020: 165-168 - [i3]Muhammad Umar Farooq, Saeedeh Moloudi, Michael Lentmaier:
Generalized LDPC Codes with Convolutional Code Constraints. CoRR abs/2002.05633 (2020) - [i2]Mojtaba Mahdavi, Muhammad Umar Farooq, Liang Liu, Ove Edfors, Viktor Öwall, Michael Lentmaier:
The Effect of Coupling Memory and Block Length on Spatially Coupled Serially Concatenated Codes. CoRR abs/2006.13396 (2020)
2010 – 2019
- 2019
- [j7]Wajeeha Irshad, Yousaf Habib
, Muhammad Umar Farooq:
A Complex Lie-Symmetry Approach to Calculate First Integrals and Their Numerical Preservation. Symmetry 11(1): 11 (2019) - [j6]Muhammad Umar Farooq:
Noether-Like Operators and First Integrals for Generalized Systems of Lane-Emden Equations. Symmetry 11(2): 162 (2019) - [j5]Muhammad Safdar, Asghar Qadir, Muhammad Umar Farooq
:
Comparison of Noether Symmetries and First Integrals of Two-Dimensional Systems of Second Order Ordinary Differential Equations by Real and Complex Methods. Symmetry 11(9): 1180 (2019) - [j4]Muhammad Umar Farooq
, Chaudry Masood Khalique
, Fazal Mahmood Mahomed:
First Integrals of Two-Dimensional Dynamical Systems via Complex Lagrangian Approach. Symmetry 11(10): 1244 (2019) - [j3]Ammar Hawbani, Xingfu Wang, Hassan Kuhlani, Aiman Ghannami, Muhammad Umar Farooq, Yaser Al-Sharabi:
Extracting the overlapped sub-regions in wireless sensor networks. Wirel. Networks 25(8): 4705-4726 (2019) - [c13]Longdy Torn, Ammar Hawbani, Xingfu Wang, Omar Busaileh, Muhammad Umar Farooq:
Heuristic Routing with Infrastructure Nodes for Data Dissemination in Vehicular Networks. ICIT 2019: 300-304 - [c12]Muhammad Umar Farooq, Farah Adeeba, Sahar Rauf, Sarmad Hussain:
Improving Large Vocabulary Urdu Speech Recognition System Using Deep Neural Networks. INTERSPEECH 2019: 2978-2982 - [c11]Muhammad Umar Farooq, Farah Adeeba, Sarmad Hussain:
X-vectors based Urdu Speaker Identification for short utterances. O-COCOSDA 2019: 1-5 - 2018
- [j2]Muhammad Umar Farooq, Xingfu Wang, Moizza Sajjad, Sara Qaisar:
Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks. KSII Trans. Internet Inf. Syst. 12(3): 1330-1347 (2018) - [c10]Muhammad Umar Farooq
, Seong Young Ko:
A Stiffness-Changing Continuum Robotic Manipulator for Possible Use in MRI-Guided Neurosurgical Interventions. BioRob 2018: 1260-1265 - [c9]Sohaib Bin Altaf Khattak, Muhammad Adeel Pasha, Muhammad Umar Farooq, Naveed Ul Hassan, Chau Yuen:
Empirical Performance Evaluation of WIFI Fingerprinting Algorithms for Indoor Localization. ICCS 2018: 303-308 - [c8]Muhammad Umar Farooq, Saeedeh Moloudi, Michael Lentmaier:
Thresholds of Braided Convolutional Codes on the AWGN Channel. ISIT 2018: 1375-1379 - [i1]Muhammad Umar Farooq, Saeedeh Moloudi, Michael Lentmaier:
Thresholds of Braided Convolutional Codes on the AWGN Channel. CoRR abs/1802.10540 (2018) - 2017
- [c7]Muhammad Umar Farooq, Aamna Shakoor, Abu Bakar Siddique:
GPS based Public Transport Arrival Time Prediction. FIT 2017: 76-81 - 2016
- [c6]Muhammad Umar Farooq, Xingfu Wang, Robail Yasrab, Sara Qaisar:
Energy Preserving Detection Model for Collaborative Black Hole Attacks in Wireless Sensor Networks. MSN 2016: 395-399 - 2013
- [c5]Muhammad Umar Farooq, Khubaib, Lizy K. John:
Store-Load-Branch (SLB) predictor: A compiler assisted branch prediction for data dependent branches. HPCA 2013: 59-70 - 2012
- [c4]Muhammad Umar Farooq, Lei Chen, Lizy Kurian John:
Compiler Support for Value-Based Indirect Branch Prediction. CC 2012: 185-199 - 2011
- [j1]Muhammad Umar Farooq, Sajid Ali
, Fazal Mahmood Mahomed:
Two-dimensional systems that arise from the Noether classification of Lagrangians on the line. Appl. Math. Comput. 217(16): 6959-6973 (2011) - 2010
- [c3]Muhammad Umar Farooq, Lei Chen, Lizy Kurian John:
Value Based BTB Indexing for indirect jump prediction. HPCA 2010: 1-11
2000 – 2009
- 2009
- [b1]Muhammad Umar Farooq:
Degradation of the composite fiber/matrix interface in marine environment. Florida Atlantic University, Boca Raton, USA, 2009 - [c2]Muhammad Umar Farooq, Lizy K. John:
Loop-Aware Instruction Scheduling with Dynamic Contention Tracking for Tiled Dataflow Architectures. CC 2009: 190-203 - [c1]Muhammad Umar Farooq, Lizy Kurian John, Margarida F. Jacome:
Compiler Controlled Speculation for Power Aware ILP Extraction in Dataflow Architectures. HiPEAC 2009: 324-338
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-18 22:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint