default search action
Muhammad Hussain
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Muhammad Hussain 0001 (aka: Mohammad Hussain 0001) — King Saud University, Department of Computer Science, College of Computer and Information Sciences, Riyadh, Saudi Arabia (and 2 more)
- Muhammad Hussain 0002 — University of Huddersfield, School of Computing and Engineering, Department of Computer Science, UK
- Muhammad Hussain 0003 — Northeast Normal University, Institute of Natural Disaster Research, School of Environment, Changchun, China
- Muhammad Hussain 0004 — COMSATS University Islamabad, Department of Mathematics, Lahore Campus, Pakistan (and 1 more)
- Muhammad Hussain 0005 — Bahria University, Department of Electrical Engineering, Karachi, Pakistan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Putra A. R. Yamin, Jaehyun Park, Hyun K. Kim, Muhammad Hussain:
Effects of button colour and background on augmented reality interfaces. Behav. Inf. Technol. 43(4): 663-676 (2024) - [j12]Muhammad Hussain, Nadeem Iqbal, Zia Bashir:
Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm. Clust. Comput. 27(4): 5355-5376 (2024) - [j11]Muhammad Hussain, Jaehyun Park:
Effect of Transparency Levels and Real-World Backgrounds on the User Interface in Augmented Reality Environments. Int. J. Hum. Comput. Interact. 40(16): 4265-4274 (2024) - [j10]Muhammad Hussain, Jaehyun Park:
Value elements among generations: a study of smartphone use between Generations Y and Z (the COVID-19 generation) in South Korea. Int. J. Mob. Commun. 23(3): 298-323 (2024) - [c3]Muhammad Hussain, Ioanna Iacovides, Tom Lawton, Vishal Sharma, Zoë Porter, Alice Cunningham, Ibrahim Habli, Shireen Hickey, Yan Jia, Phillip Morgan, Nee Ling Wong:
Development and translation of human-AI interaction models into working prototypes for clinical decision-making. Conference on Designing Interactive Systems 2024 - [c2]Atif Ali, Shahzad Ahmed, Muhammad Hussain, Talat Ahmad Bhutta, Ali Raza, Muhammad Waqas Nadeem, Yasir Khan Jadoon, Farman Ali:
The Synergy of Artificial Intelligence and Cybersecurity. ICCR 2024: 1-5 - [i6]Mujadded Al Rabbani Alif, Muhammad Hussain:
YOLOv1 to YOLOv10: A comprehensive review of YOLO variants and their application in the agricultural domain. CoRR abs/2406.10139 (2024) - [i5]Muhammad Hussain:
YOLOv5, YOLOv8 and YOLOv10: The Go-To Detectors for Real-time Vision. CoRR abs/2407.02988 (2024) - [i4]Athulya Sundaresan Geetha, Muhammad Hussain:
A Comparative Analysis of YOLOv5, YOLOv8, and YOLOv10 in Kitchen Safety. CoRR abs/2407.20872 (2024) - [i3]Rahima Khanam, Muhammad Hussain:
What is YOLOv5: A deep look into the internal features of the popular object detector. CoRR abs/2407.20892 (2024) - [i2]Athulya Sundaresan Geetha, Muhammad Hussain:
From SAM to SAM 2: Exploring Improvements in Meta's Segment Anything Model. CoRR abs/2408.06305 (2024) - [i1]Gracile Astlin Pereira, Muhammad Hussain:
A Review of Transformer-Based Models for Computer Vision Tasks: Capturing Global Context and Spatial Relationships. CoRR abs/2408.15178 (2024) - 2023
- [j9]Muhammad Hussain, Jaehyun Park, Hyun K. Kim:
Effects of Interaction Method, Size, and Distance to Object on Augmented Reality Interfaces. Interact. Comput. 35(1): 1-11 (2023) - [j8]Hao Guan, Farukh Ejaz, Atiq ur Rehman, Muhammad Hussain, Saeed Kosari:
Fuzzy topological invariants in uniform fuzzy graphs. J. Intell. Fuzzy Syst. 45(1): 1653-1662 (2023) - 2022
- [j7]Muhammad Hussain, Nadeem Iqbal, Zia Bashir:
A chaotic image encryption scheme based on multi-directional confusion and diffusion operations. J. Inf. Secur. Appl. 70: 103347 (2022) - [j6]Zia Bashir, M. G. Abbas Malik, Muhammad Hussain, Nadeem Iqbal:
Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol. Multim. Tools Appl. 81(3): 3867-3897 (2022) - 2021
- [j5]Muhammad Hussain, Woonyoung Jeong, Il-Suk Kang, Kyeong-Keun Choi, Syed Hassan Abbas Jaffery, Asif Ali, Tassawar Hussain, Muhammad Ayaz, Sajjad Hussain, Jongwan Jung:
Highly Fast Response of Pd/Ta2O5/SiC and Pd/Ta2O5/Si Schottky Diode-Based Hydrogen Sensors. Sensors 21(4): 1042 (2021) - 2020
- [j4]Shahan Yamin Siddiqui, Atifa Athar, Muhammad Adnan Khan, Sagheer Abbas, Yousaf Saeed, Muhammad Farrukh Khan, Muhammad Hussain:
Modelling, Simulation and Optimization of Diagnosis Cardiovascular Disease Using Computational Intelligence Approaches. J. Medical Imaging Health Informatics 10(5): 1005-1022 (2020) - [j3]Muhammad Hussain, Yasar Amin, Kyung-Geun Lee:
A Compact and Flexible UHF RFID Tag Antenna for Massive IoT Devices in 5G System. Sensors 20(19): 5713 (2020) - [e1]Robert Thomson, Halil Bisgin, Christopher L. Dancy, Ayaz Hyder, Muhammad Hussain:
Social, Cultural, and Behavioral Modeling - 13th International Conference, SBP-BRiMS 2020, Washington, DC, USA, October 18-21, 2020, Proceedings. Lecture Notes in Computer Science 12268, Springer 2020, ISBN 978-3-030-61254-2 [contents]
2010 – 2019
- 2018
- [j2]Shahid Imran, Muhammad Kamran Siddiqui, Muhammad Imran, Muhammad Hussain, Hafiz Muhammad Bilal, Imran Zulfiqar Cheema, Ali Tabraiz, Zeeshan Saleem:
Computing the Metric Dimension of Gear Graphs. Symmetry 10(6): 209 (2018) - 2014
- [c1]Katarzyna Grzybowska, Anjali Awasthi, Mohammad Hussain:
Modeling enablers for sustainable logistics collaboration integrating - Canadian and Polish perspectives. FedCSIS 2014: 1311-1319 - 2012
- [j1]Muhammad Hussain, Edy Tri Baskoro, Kashif Ali:
On super antimagic total labeling of Harary graph. Ars Comb. 104: 225-233 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint