default search action
Sheroz Khan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Anas M. Al-Oraiqat, Oleksandr Drieiev, Hanna Drieieva, Yelyzaveta Meleshko, Hazim Saleh Al-Rawashdeh, Karim A. Al-Oraiqat, Yassin M. Y. Hasan, Noor Maricar, Sheroz Khan:
Spatiotemporal crowds features extraction of infrared images using neural network. J. Ambient Intell. Humaniz. Comput. 15(4): 2543-2556 (2024) - [j15]Adib Habbal, Hassen Hamouda, Abdullah M. Alnajim, Sheroz Khan, Mohammed F. Alrifaie:
Privacy as a Lifestyle: Empowering assistive technologies for people with disabilities, challenges and future directions. J. King Saud Univ. Comput. Inf. Sci. 36(5): 102039 (2024) - [c14]Arif Warsi, Munaisyah Abdullah, Nasreen Jawaid, Sheroz Khan, Muhammad Yahya:
RZUD: A Novel Hybrid Model for Small Sized Handgun Detection. IMCOM 2024: 1-8 - 2023
- [j14]Mohammed Mohiuddin, Noor Maricar, Kushsairy Abdul Kadir, Nurul Fazlin Roslan, Muhammad Islam, Sheroz Khan, Ezzidin H. E. Aboadla:
Mitigation of Harmonics Using Novel Sector-Based Switching Pattern Space Vector Pulse Width Modulation. IEEE Access 11: 51465-51479 (2023) - [j13]Muhammad Haris Kaka Khel, Kushsairy Abdul Kadir, Sheroz Khan, M. N. M. M. Noor, Haidawati Nasir, Nawaf Waqas, Akbar Khan:
Realtime Crowd Monitoring - Estimating Count, Speed and Direction of People Using Hybridized YOLOv4. IEEE Access 11: 56368-56379 (2023) - [j12]Abdul Majeed, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam, Sheroz Khan:
Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches. Future Internet 15(6): 193 (2023) - 2022
- [j11]Nawaf Waqas, Sairul Izwan Safie, Kushsairy Abdul Kadir, Sheroz Khan, Muhammad Haris Kaka Khel:
DEEPFAKE Image Synthesis for Data Augmentation. IEEE Access 10: 80847-80857 (2022) - [j10]Akbar Khan, Kushsairy Abdul Kadir, Haidawati Nasir, Jawad Ali Shah, Waleed Albattah, Sheroz Khan, Muhammad Haris Kakakhel:
Crowd Counting and Localization Beyond Density Map. IEEE Access 10: 133142-133151 (2022) - [j9]Shabana Habib, Saleh Alyahya, Aizaz Ahmed, Muhammad Islam, Sheroz Khan, Ishrat Khan, Muhammad Kamil:
X-ray Image-Based COVID-19 Patient Detection Using Machine Learning-Based Techniques. Comput. Syst. Sci. Eng. 43(2): 671-682 (2022) - [j8]Majed Alsanea, Shabana Habib, Noreen Fayyaz Khan, Mohammed F. Alsharekh, Muhammad Islam, Sheroz Khan:
A Deep-Learning Model for Real-Time Red Palm Weevil Detection and Localization. J. Imaging 8(6): 170 (2022) - [j7]Shabana Habib, Majed Alsanea, Mohammed Aloraini, Hazim Saleh Al-Rawashdeh, Muhammad Islam, Sheroz Khan:
An Efficient and Effective Deep Learning-Based Model for Real-Time Face Mask Detection. Sensors 22(7): 2602 (2022) - [j6]Anas M. Al-Oraiqat, Tetiana Smirnova, Oleksandr Drieiev, Oleksii Smirnov, Liudmyla I. Polishchuk, Sheroz Khan, Yassin M. Y. Hasan, Aladdein M. Amro, Hazim Saleh Al-Rawashdeh:
Method for Determining Treated Metal Surface Quality Using Computer Vision Technology. Sensors 22(16): 6223 (2022) - [j5]Oussama Allama, Mohamed Hadi Habaebi, Sheroz Khan, Elfatih Abdelrahman Ahmed Elsheikh, Fakher Eldin Mohamed Suliman:
Modelling and Control Design of a Non-Collaborative UAV Wireless Charging System. Sensors 22(20): 7897 (2022) - [c13]Muhammad Haris Kaka Khel, Kushsairy Abdul Kadir, Sheroz Khan, Waleed Albattah, Haidawati Nasir, M. N. M. M. Noor, Akbar Khan, Nawaf Waqas:
Hybridized Yolov4 for Detecting and Counting People in Congested Crowds. I2MTC 2022: 1-6 - 2021
- [j4]Mohammad Kamrul Hasan, Shayla Islam, Rossilawati Sulaiman, Sheroz Khan, Aisha Hassan Abdalla Hashim, Shabana Habib, Muhammad Islam, Saleh Alyahya, Musse Mohamed Ahmed, Samar Kamil, Md Arif Hassan:
Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications. IEEE Access 9: 47731-47742 (2021) - [j3]Shahzad Hameed, Saleh Alyahya, Qurratul-Ain Minhas, Shabana Habib, Asif Nawaz, Sheeraz Ahmed, Atif Ishtiaq, Muhammad Islam, Sheroz Khan:
Link and Loss Aware GW-COOP Routing Protocol for FANETs. IEEE Access 9: 110544-110557 (2021) - [j2]Shabana Habib, Altaf Hussain, Waleed Albattah, Muhammad Islam, Sheroz Khan, Rehan Ullah Khan, Khalil Khan:
Abnormal Activity Recognition from Surveillance Videos Using Convolutional Neural Network. Sensors 21(24): 8291 (2021)
2010 – 2019
- 2019
- [c12]Talha Ahmed Khan, Muhammad Alam, Faraz Ahmed Shaikh, Sheroz Khan, Kushsairy Abdul Kadir, Mohd Su'ud Mazliham, Zeeshan Shahid, Muhammad Yahya:
Flash Floods Prediction using Real Time data: An Implementation of ANN-PSO with less False Alarm. I2MTC 2019: 1-6 - [c11]Faraz Ahmed Shaikh, Sheroz Khan, A. H. M. Zahirul Alam, Mohamed Hadi Habaebi, Dominique Baillargeat, Kushsairy Abdul Kadir, Jawad Ali Shah, Zeeshan Shahid, Muhammad Yahya:
UWB Antenna Based Time-Domain Approach for Through the Walls Gap Estimation. I2MTC 2019: 1-6 - [c10]Muhammad Yahya, Jawad Ali Shah, Kushsairy Abdul Kadir, Arif Warsi, Sheroz Khan, Haidawati Nasir:
Accurate Shoulder Joint Angle Estimation Using Single RGB camera for Rehabilitation. I2MTC 2019: 1-6 - 2018
- [i1]Muhammad Yahya, Jawad Ali Shah, Arif Warsi, Kushsairy Abdul Kadir, Sheroz Khan, M. Izani:
Real Time Elbow Angle Estimation Using Single RGB Camera. CoRR abs/1808.07017 (2018) - 2017
- [c9]Atika Arshad, Sheroz Khan, A. H. M. Zahirul Alam, Kushsairy Abdul Kadir, Rumana Tasnim, Ahmad Fadzil Ismail:
A capacitive proximity sensing scheme for human motion detection. I2MTC 2017: 1-5 - [c8]Ezzidin H. E. Aboadla, Khairil A. Aznan, Majdee Tohtayong, Sheroz Khan, M. A. Hannan, M. Nasir Uddin:
Low spikes and low harmonic distortion multilevel inverter for induction motor implementation. IAS 2017: 1-7 - [c7]Jawad Ali Shah, Hassaan Haider, Kushsairy Abdul Kadir, Sheroz Khan:
Sparse signal reconstruction of compressively sampled signals using smoothed ℓ0-norm. ICSIPA 2017: 61-65 - 2016
- [c6]Atika Arshad, Sheroz Khan, A. H. M. Zahirul Alam, Rumana Tasnim, Teddy Surya Gunawan, Robiah Ahmad, Chandrasekharan Nataraj:
An activity monitoring system for senior citizens living independently using capacitive sensing technique. I2MTC 2016: 1-6 - [c5]Kushsairy Abdul Kadir, Mohd Khairi Kamaruddin, Haidawati Nasir, Sairul Izwan Safie, Zulkifli Abdul Kadir Bakti, Mohd Ridzuan Isa, Sheroz Khan:
Embedded vision : Enhancing embedded platform for face detection system. I2MTC 2016: 1-5 - [c4]Chandrasekharan Nataraj, Sheroz Khan, Mohammed Hadi Habaebi, Asan G. A. Muthalif, Atika Arshad:
Resonant coils analysis for inductively coupled wireless power transfer applications. I2MTC 2016: 1-6 - 2015
- [c3]Mansoor Hussain Shah, Khairul Azami Sidek, Sheroz Khan, Syed Absar Kazmi, Kushsairy Abdul Kadir:
Measurement of Photoplythsmography signal for Heart Rate Variability and comparison of two different age groups. I2MTC 2015: 1981-1986 - 2014
- [c2]Syamsi Taufik, Sheroz Khan, Anis Nurashikin Nordin, Ahmad Anwar Zainuddin:
Design and simulation of 10 MHz MEMS oscillator. I2MTC 2014: 1134-1138 - 2013
- [c1]A. Lutfi Torla, Sheroz Khan, Asan Ghani Muthalif, Amelia Wong Azman, Yasir Mohd-Mustafah:
Low voltage DC power supply with spike-blocking features. I2MTC 2013: 1161-1164
2000 – 2009
- 2007
- [j1]Othman O. Khalifa, Sheroz Khan, Md. Rafiqul Islam, Ahmad Suleiman:
Malaysian Vehicle License Plate Recognition. Int. Arab J. Inf. Technol. 4(4): 359-364 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint