default search action
Hameed Hussain
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Hameed Hussain, Muhammad Zakarya, Ahmad Ali, Ayaz Ali Khan, Mohammad Reza Chalak Qazani, Mahmood Al-Bahri, Muhammad Haleem:
Energy Efficient Real-Time Tasks Scheduling on High-Performance Edge-Computing Systems Using Genetic Algorithm. IEEE Access 12: 54879-54892 (2024) - 2023
- [j10]Shahid Rahman, Jamal Uddin, Muhammad Zakarya, Hameed Hussain, Ayaz Ali Khan, Aftab Ahmed Khan, Muhammad Haleem:
A Comprehensive Study of Digital Image Steganographic Techniques. IEEE Access 11: 6770-6791 (2023) - [j9]Iqra Mehmood, Sidra Shahid, Hameed Hussain, Inayat Khan, Shafiq Ahmad, Shahid Rahman, Najeeb Ullah, Shamsul Huda:
A Novel Approach to Improve Software Defect Prediction Accuracy Using Machine Learning. IEEE Access 11: 63579-63597 (2023) - [j8]Mudasir Mahmood, Muhammad Ijaz Khan, Ziauddin, Hameed Hussain, Inayat Khan, Shahid Rahman, Muhammad Shabir, Badam Niazi:
Improving Security Architecture of Internet of Medical Things: A Systematic Literature Review. IEEE Access 11: 107725-107753 (2023) - [j7]Asmat Ullah, Muhammad Ismail Mohmand, Hameed Hussain, Sumaira Johar, Inayat Khan, Shafiq Ahmad, Haitham A. Mahmoud, Shamsul Huda:
Customer Analysis Using Machine Learning-Based Classification Algorithms for Effective Segmentation Using Recency, Frequency, Monetary, and Time. Sensors 23(6): 3180 (2023) - 2022
- [j6]Ismail, Muhammad Ismail Mohmand, Hameed Hussain, Ayaz Ali Khan, Ubaid Ullah, Muhammad Zakarya, Aftab Ahmed Khan, Mushtaq Raza, Izaz Ur Rahman, Muhammad Haleem:
A Machine Learning-Based Classification and Prediction Technique for DDoS Attacks. IEEE Access 10: 21443-21454 (2022) - [j5]Afzal Rahman, Haider Ali, Noor Badshah, Lavdie Rada, Ayaz Ali Khan, Hameed Hussain, Muhammad Zakarya, Aftab Ahmed Khan, Izaz Ur Rahman, Mushtaq Raza, Muhammad Haleem:
A Selective Segmentation Model Using Dual-Level Set Functions and Local Spatial Distance. IEEE Access 10: 22344-22358 (2022) - [j4]Shahid Rahman, Jamal Uddin, Habib Ullah Khan, Hameed Hussain, Ayaz Ali Khan, Muhammad Zakarya:
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method. IEEE Access 10: 124053-124075 (2022)
2010 – 2019
- 2014
- [j3]Muhammad Bilal Qureshi, Maryam Mehri Dehnavi, Nasro Min-Allah, Muhammad Shuaib Qureshi, Hameed Hussain, Ilias Rentifis, Nikos Tziritas, Thanasis Loukopoulos, Samee Ullah Khan, Cheng-Zhong Xu, Albert Y. Zomaya:
Survey on Grid Resource Allocation Mechanisms. J. Grid Comput. 12(2): 399-441 (2014) - 2013
- [j2]Hameed Hussain, Saif Ur Rehman Malik, Abdul Hameed, Samee Ullah Khan, Gage Bickler, Nasro Min-Allah, Muhammad Bilal Qureshi, Limin Zhang, Yongji Wang, Nasir Ghani, Joanna Kolodziej, Albert Y. Zomaya, Cheng-Zhong Xu, Pavan Balaji, Abhinav Vishnu, Frédéric Pinel, Johnatan E. Pecero, Dzmitry Kliazovich, Pascal Bouvry, Hongxiang Li, Lizhe Wang, Dan Chen, Ammar Rayes:
A survey on resource allocation in high performance distributed computing systems. Parallel Comput. 39(11): 709-736 (2013) - [c3]Sadiq Shah, Hameed Hussain, Muhammad Shoaib:
Minimizing non-coordinated interference in multi-radio multi-channel Wireless Mesh Networks (MRMC-WMNs). ICDIM 2013: 24-28 - [c2]Muhammad Shoaib, Nasru Minallah, Sadiq Shah, Shahzad Rizwan, Hameed Hussain:
Investigating the impact of group mobility models over the on-demand routing protocol in MANETs. ICDIM 2013: 29-34 - [c1]Hameed Hussain, Muhammad Shoaib, Muhammad Bilal Qureshi, Sadiq Shah:
Load balancing through task shifting and task splitting strategies in multi-core environment. ICDIM 2013: 385-390 - 2012
- [j1]Nasro Min-Allah, Hameed Hussain, Samee Ullah Khan, Albert Y. Zomaya:
Power efficient rate monotonic scheduling for multi-core systems. J. Parallel Distributed Comput. 72(1): 48-57 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint