Awais Adnan

According to our database1, Awais Adnan authored at least 30 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An adaptive learning approach for customer churn prediction in the telecommunication industry using evolutionary computation and Naïve Bayes.
Appl. Soft Comput., April, 2023

Rotation invariant person tracker using top view.
J. Ambient Intell. Humaniz. Comput., 2023

2022
A Real-Time IoT and Image Processing based Weeds Classification System for Selective Herbicide.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

2021
Convolutional Neural Network Based Vehicle Classification in Adverse Illuminous Conditions for Intelligent Transportation Systems.
Complex., 2021

A Systematic Analysis of Link Prediction in Complex Network.
IEEE Access, 2021

2020
Burnt Human Skin Segmentation and Depth Classification Using Deep Convolutional Neural Network (DCNN).
J. Medical Imaging Health Informatics, 2020

2019
Person detector for different overhead views using machine learning.
Int. J. Mach. Learn. Cybern., 2019

Big Data Features, Applications, and Analytics in Cardiology - A Systematic Literature Review.
IEEE Access, 2019

Big Data Visualization in Cardiology - A Systematic Review and Future Directions.
IEEE Access, 2019

Multiple Moving Vehicle Speed Estimation Using Blob Analysis.
Proceedings of the New Knowledge in Information Systems and Technologies, 2019

Segmentation of Skin Lesion Using Harris Corner Detection and Region Growing.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

Overhead View Person Detection Using YOLO.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

Text to Code: Pseudo Code Generation.
Proceedings of the Context-Aware Systems and Applications, and Nature of Computation and Communication, 2019

2018
Urdu ligature recognition using multi-level agglomerative hierarchical clustering.
Clust. Comput., 2018

A prudent based approach for compromised user credentials detection.
Clust. Comput., 2018

A robust algorithm for detecting people in overhead views.
Clust. Comput., 2018

Urdu Optical Character Recognition Systems: Present Contributions and Future Directions.
IEEE Access, 2018

Robust Background Subtraction Based Person's Counting From Overhead View.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Segmentation of affected skin lesion with blind deconvolution and L*a*b colour space.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Beyond Beall's Blacklist: Automatic Detection of Open Access Predatory Research Journals.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
Ego-motion estimation concepts, algorithms and challenges: an overview.
Multim. Tools Appl., 2017

A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks.
J. Sensors, 2017

Customer churn prediction in the telecommunication sector using a rough set approach.
Neurocomputing, 2017

2016
Low level Visio-Temporal Features for Violence Detection in Cartoon Videos.
J. Multim. Process. Technol., 2016

Comparing Oversampling Techniques to Handle the Class Imbalance Problem: A Customer Churn Prediction Case Study.
IEEE Access, 2016

2015
Implementation and Analysis of Clustering Techniques Applied on Pocket Switched Network.
Int. J. Distributed Sens. Networks, 2015

Machine learning based cognitive skills calculations for different emotional conditions.
Proceedings of the 14th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2015

2013
Assessment of capacity and performance of decentralized EMIS activities in developing countries.
Proceedings of the Eighth International Conference on Digital Information Management (ICDIM 2013), 2013

Foreground detection using background subtraction with histogram.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2013

2011
Region-Based Security Architecture for DTN.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011


  Loading...